Search results for: HTTP protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1141

Search results for: HTTP protocol

931 Connectomic Correlates of Cerebral Microhemorrhages in Mild Traumatic Brain Injury Victims with Neural and Cognitive Deficits

Authors: Kenneth A. Rostowsky, Alexander S. Maher, Nahian F. Chowdhury, Andrei Irimia

Abstract:

The clinical significance of cerebral microbleeds (CMBs) due to mild traumatic brain injury (mTBI) remains unclear. Here we use magnetic resonance imaging (MRI), diffusion tensor imaging (DTI) and connectomic analysis to investigate the statistical association between mTBI-related CMBs, post-TBI changes to the human connectome and neurological/cognitive deficits. This study was undertaken in agreement with US federal law (45 CFR 46) and was approved by the Institutional Review Board (IRB) of the University of Southern California (USC). Two groups, one consisting of 26 (13 females) mTBI victims and another comprising 26 (13 females) healthy control (HC) volunteers were recruited through IRB-approved procedures. The acute Glasgow Coma Scale (GCS) score was available for each mTBI victim (mean µ = 13.2; standard deviation σ = 0.4). Each HC volunteer was assigned a GCS of 15 to indicate the absence of head trauma at the time of enrollment in our study. Volunteers in the HC and mTBI groups were matched according to their sex and age (HC: µ = 67.2 years, σ = 5.62 years; mTBI: µ = 66.8 years, σ = 5.93 years). MRI [including T1- and T2-weighted volumes, gradient recalled echo (GRE)/susceptibility weighted imaging (SWI)] and gradient echo (GE) DWI volumes were acquired using the same MRI scanner type (Trio TIM, Siemens Corp.). Skull-stripping and eddy current correction were implemented. DWI volumes were processed in TrackVis (http://trackvis.org) and 3D Slicer (http://www.slicer.org). Tensors were fit to DWI data to perform DTI, and tractography streamlines were then reconstructed using deterministic tractography. A voxel classifier was used to identify image features as CMB candidates using Microbleed Anatomic Rating Scale (MARS) guidelines. For each peri-lesional DTI streamline bundle, the null hypothesis was formulated as the statement that there was no neurological or cognitive deficit associated with between-scan differences in the mean FA of DTI streamlines within each bundle. The statistical significance of each hypothesis test was calculated at the α = 0.05 level, subject to the family-wise error rate (FWER) correction for multiple comparisons. Results: In HC volunteers, the along-track analysis failed to identify statistically significant differences in the mean FA of DTI streamline bundles. In the mTBI group, significant differences in the mean FA of peri-lesional streamline bundles were found in 21 out of 26 volunteers. In those volunteers where significant differences had been found, these differences were associated with an average of ~47% of all identified CMBs (σ = 21%). In 12 out of the 21 volunteers exhibiting significant FA changes, cognitive functions (memory acquisition and retrieval, top-down control of attention, planning, judgment, cognitive aspects of decision-making) were found to have deteriorated over the six months following injury (r = -0.32, p < 0.001). Our preliminary results suggest that acute post-TBI CMBs may be associated with cognitive decline in some mTBI patients. Future research should attempt to identify mTBI patients at high risk for cognitive sequelae.

Keywords: traumatic brain injury, magnetic resonance imaging, diffusion tensor imaging, connectomics

Procedia PDF Downloads 170
930 Intended Use of Genetically Modified Organisms, Advantages and Disadvantages

Authors: Pakize Ozlem Kurt Polat

Abstract:

GMO (genetically modified organism) is the result of a laboratory process where genes from the DNA of one species are extracted and artificially forced into the genes of an unrelated plant or animal. This technology includes; nucleic acid hybridization, recombinant DNA, RNA, PCR, cell culture and gene cloning techniques. The studies are divided into three groups of properties transferred to the transgenic plant. Up to 59% herbicide resistance characteristic of the transfer, 28% resistance to insects and the virus seems to be related to quality characteristics of 13%. Transgenic crops are not included in the commercial production of each product; mostly commercial plant is soybean, maize, canola, and cotton. Day by day increasing GMO interest can be listed as follows; Use in the health area (Organ transplantation, gene therapy, vaccines and drug), Use in the industrial area (vitamins, monoclonal antibodies, vaccines, anti-cancer compounds, anti -oxidants, plastics, fibers, polyethers, human blood proteins, and are used to produce carotenoids, emulsifiers, sweeteners, enzymes , food preservatives structure is used as a flavor enhancer or color changer),Use in agriculture (Herbicide resistance, Resistance to insects, Viruses, bacteria, fungi resistance to disease, Extend shelf life, Improving quality, Drought , salinity, resistance to extreme conditions such as frost, Improve the nutritional value and quality), we explain all this methods step by step in this research. GMO has advantages and disadvantages, which we explain all of them clearly in full text, because of this topic, worldwide researchers have divided into two. Some researchers thought that the GMO has lots of disadvantages and not to be in use, some of the researchers has opposite thought. If we look the countries law about GMO, we should know Biosafety law for each country and union. For this Biosecurity reasons, the problems caused by the transgenic plants, including Turkey, to minimize 130 countries on 24 May 2000, ‘the United Nations Biosafety Protocol’ signed nudes. This protocol has been prepared in addition to Cartagena Biosafety Protocol entered into force on September 11, 2003. This protocol GMOs in general use by addressing the risks to human health, biodiversity and sustainable transboundary movement of all GMOs that may affect the prevention, transit covers were dealt and used. Under this protocol we have to know the, ‘US Regulations GMO’, ‘European Union Regulations GMO’, ‘Turkey Regulations GMO’. These three different protocols have different applications and rules. World population increasing day by day and agricultural fields getting smaller for this reason feeding human and animal we should improve agricultural product yield and quality. Scientists trying to solve this problem and one solution way is molecular biotechnology which is including the methods of GMO too. Before decide to support or against the GMO, should know the GMO protocols and it effects.

Keywords: biotechnology, GMO (genetically modified organism), molecular marker

Procedia PDF Downloads 233
929 Accounting Management Information System for Convenient Shop in Bangkok Thailand

Authors: Anocha Rojanapanich

Abstract:

The purpose of this research is to develop and design an accounting management information system for convenient shop in Bangkok Thailand. The study applied the System Development Life Cycle (SDLC) for development which began with study and analysis of current data, including the existing system. Then, the system was designed and developed to meet users’ requirements via the internet network by use of application software such as My SQL for database management, Product diversity, Apache HTTP Server for Web Server and PHP Hypertext Preprocessor for an interface between web server, database and users. The system was designed into two subsystems as the main system, or system for head office, and the branch system for branch shops. These consisted of three parts which are classified by user management as shop management, inventory management and Point of Sale (POS) management and importance of cost information for decision making also as well as.

Keywords: accounting management information system, convenient shop, cost information for decision making system, development life cycle

Procedia PDF Downloads 420
928 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 383
927 Effect of Radiotherapy/Chemotherapy Protocol on the Gut Microbiome in Pediatric Cancer Patients

Authors: Nourhan G. Sahly, Ahmed Moustafa, Mohamed S. Zaghloul, Tamer Z. Salem

Abstract:

The gut microbiome plays important roles in the human body that includes but not limited to digestion, immunity, homeostasis and response to some drugs such as chemotherapy and immunotherapy. Its role has also been linked to radiotherapy and associated gastrointestinal injuries, where the microbial dysbiosis could be the driving force for dose determination or the complete suspension of the treatment protocol. Linking the gut microbiota alterations to different cancer treatment protocols is not easy especially in humans. However, enormous effort was exerted to understand this complex relationship. In the current study, we described the gut microbiota dysbiosis in pediatric sarcoma patients, in the pelvic region, with regards to radiotherapy and antibiotics. Fecal samples were collected as a source of microbial DNA for which the gene encoding for V3-V5 regions of 16S rRNA was sequenced. Two of the three patients understudy had experienced an increase in alpha diversity post exposure to 50.4 Gy. Although phylum Firmicutes overall relative abundance has generally decreased, six of its taxa increased in all patients. Our results may indicate the possibility of radiosensitivity or enrichment of the antibiotic resistance of the elevated taxa. Further studies are needed to describe the extent of radiosensitivity with regards to antibiotic resistance.

Keywords: combined radiotherapy and chemotherapy, gut microbiome, pediatric cancer, radiosensitivity

Procedia PDF Downloads 151
926 Parametric Evaluation for the Optimization of Gastric Emptying Protocols Used in Health Care Institutions

Authors: Yakubu Adamu

Abstract:

The aim of this research was to assess the factors contributing to the need for optimisation of the gastric emptying protocols in nuclear medicine and molecular imaging (SNMMI) procedures. The objective is to suggest whether optimisation is possible and provide supporting evidence for the current imaging protocols of gastric emptying examination used in nuclear medicine. The research involved the use of some selected patients with 30 dynamic series for the image processing using ImageJ, and by so doing, the calculated half-time, retention fraction to the 60 x1 minute, 5 minute and 10-minute protocol, and other sampling intervals were obtained. Results from the study IDs for the gastric emptying clearance half-time were classified into normal, abnormal fast, and abnormal slow categories. In the normal category, which represents 50% of the total gastric emptying image IDs processed, their clearance half-time was within the range of 49.5 to 86.6 minutes of the mean counts. Also, under the abnormal fast category, their clearance half-time fell between 21 to 43.3 minutes of the mean counts, representing 30% of the total gastric emptying image IDs processed, and the abnormal slow category had clearance half-time within the range of 138.6 to 138.6 minutes of the mean counts, representing 20%. The results indicated that the calculated retention fraction values from the 1, 5, and 10-minute sampling curves and the measured values of gastric emptying retention fraction from sampling curves of the study IDs had a normal retention fraction of <60% and decreased exponentially with an increase in time and it was evident with low percentages of retention fraction ratios of < 10% after the 4 hours. Thus, this study does not change categories suggesting that these values could feasibly be used instead of having to acquire actual images. Findings from the study suggest that the current gastric emptying protocol can be optimized by acquiring fewer images. The study recommended that the gastric emptying studies should be performed with imaging at a minimum of 0, 1, 2, and 4 hours after meal ingestion.

Keywords: gastric emptying, retention fraction, clearance halftime, optimisation, protocol

Procedia PDF Downloads 0
925 The Polarization on Twitter and COVID-19 Vaccination in Brazil

Authors: Giselda Cristina Ferreira, Carlos Alberto Kamienski, Ana Lígia Scott

Abstract:

The COVID-19 pandemic has enhanced the anti-vaccination movement in Brazil, supported by unscientific theories and false news and the possibility of wide communication through social networks such as Twitter, Facebook, and YouTube. The World Health Organization (WHO) classified the large volume of information on the subject against COVID-19 as an Infodemic. In this paper, we present a protocol to identify polarizing users (called polarizers) and study the profiles of Brazilian polarizers on Twitter (renamed to X some weeks ago). We analyzed polarizing interactions on Twitter (in Portuguese) to identify the main polarizers and how the conflicts they caused influenced the COVID-19 vaccination rate throughout the pandemic. This protocol uses data from this social network, graph theory, Java, and R-studio scripts to model and analyze the data. The information about the vaccination rate was obtained in a public database for the government called OpenDataSus. The results present the profiles of Twitter’s Polarizer (political position, gender, professional activity, immunization opinions). We observed that social and political events influenced the participation of these different profiles in conflicts and the vaccination rate.

Keywords: Twitter, polarization, vaccine, Brazil

Procedia PDF Downloads 75
924 Microfluidic Plasmonic Bio-Sensing of Exosomes by Using a Gold Nano-Island Platform

Authors: Srinivas Bathini, Duraichelvan Raju, Simona Badilescu, Muthukumaran Packirisamy

Abstract:

A bio-sensing method, based on the plasmonic property of gold nano-islands, has been developed for detection of exosomes in a clinical setting. The position of the gold plasmon band in the UV-Visible spectrum depends on the size and shape of gold nanoparticles as well as on the surrounding environment. By adsorbing various chemical entities, or binding them, the gold plasmon band will shift toward longer wavelengths and the shift is proportional to the concentration. Exosomes transport cargoes of molecules and genetic materials to proximal and distal cells. Presently, the standard method for their isolation and quantification from body fluids is by ultracentrifugation, not a practical method to be implemented in a clinical setting. Thus, a versatile and cutting-edge platform is required to selectively detect and isolate exosomes for further analysis at clinical level. The new sensing protocol, instead of antibodies, makes use of a specially synthesized polypeptide (Vn96), to capture and quantify the exosomes from different media, by binding the heat shock proteins from exosomes. The protocol has been established and optimized by using a glass substrate, in order to facilitate the next stage, namely the transfer of the protocol to a microfluidic environment. After each step of the protocol, the UV-Vis spectrum was recorded and the position of gold Localized Surface Plasmon Resonance (LSPR) band was measured. The sensing process was modelled, taking into account the characteristics of the nano-island structure, prepared by thermal convection and annealing. The optimal molar ratios of the most important chemical entities, involved in the detection of exosomes were calculated as well. Indeed, it was found that the results of the sensing process depend on the two major steps: the molar ratios of streptavidin to biotin-PEG-Vn96 and, the final step, the capture of exosomes by the biotin-PEG-Vn96 complex. The microfluidic device designed for sensing of exosomes consists of a glass substrate, sealed by a PDMS layer that contains the channel and a collecting chamber. In the device, the solutions of linker, cross-linker, etc., are pumped over the gold nano-islands and an Ocean Optics spectrometer is used to measure the position of the Au plasmon band at each step of the sensing. The experiments have shown that the shift of the Au LSPR band is proportional to the concentration of exosomes and, thereby, exosomes can be accurately quantified. An important advantage of the method is the ability to discriminate between exosomes having different origins.

Keywords: exosomes, gold nano-islands, microfluidics, plasmonic biosensing

Procedia PDF Downloads 172
923 Reactive and Concurrency-Based Image Resource Management Module for iOS Applications

Authors: Shubham V. Kamdi

Abstract:

This paper aims to serve as an introduction to image resource caching techniques for iOS mobile applications. It will explain how developers can break down multiple image-downloading tasks concurrently using state-of-the-art iOS frameworks, namely Swift Concurrency and Combine. The paper will explain how developers can leverage SwiftUI to develop reactive view components and use declarative coding patterns. Developers will learn to bypass built-in image caching systems by curating the procedure to implement a swift-based LRU cache system. The paper will provide a full architectural overview of a system, helping readers understand how mobile applications are designed professionally. It will cover technical discussion, helping readers understand the low-level details of threads and how they can switch between them, as well as the significance of the main and background threads for requesting HTTP services via mobile applications.

Keywords: main thread, background thread, reactive view components, declarative coding

Procedia PDF Downloads 25
922 Health Monitoring of Primates in a Conservation Unit in Brazil

Authors: Elisângela de Albuquerque Sobreira Borovoski, Ricardo Willian Borovoski

Abstract:

Microbiological infections acquired by animals pose a risk to public health. In public health, monitoring the health of primates is linked to the risk of transmission of zoonoses through scratches, bites and contact with biological samples. The project was approved by the Ethics Committee on the Use of Animals Protocol No. 170/2019. It was authorized by ICMBio Protocol No. 52117-1. The study was carried out in the period 2019-2022 in the municipality of Anápolis. Iron and galvanized wire traps were used and the animals were anesthetized with 4.4mg/kg zolethyl intramuscularly and saliva was collected through swabs. Fifty-three capuchin monkeys were captured from the Onofre Quinan Environmental Park in Anápolis-Goiás for health monitoring purposes. In the laboratory, the samples were deposited on the agar surface and seeded by exhaustion to obtain isolated colonies. These colonies were analyzed according to morphocolonial characteristics. Morphometric characterization and biochemical tests for bacterial identification were performed. A total of 861 bacterial samples were isolated, nine of which were strict anaerobic bacteria of the genus Peptostreptococcus. Previous and constant knowledge of the prevalence of pathogenic agents in biological samples is essential to be prepared to act in pandemic situations.

Keywords: Brazil, microbiology, monkeys, public health

Procedia PDF Downloads 76
921 Performance Evaluation of Hierarchical Location-Based Services Coupled to the Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks

Authors: Rania Khadim, Mohammed Erritali, Abdelhakim Maaden

Abstract:

Nowadays Wireless Sensor Networks have attracted worldwide research and industrial interest, because they can be applied in various areas. Geographic routing protocols are very suitable to those networks because they use location information when they need to route packets. Obviously, location information is maintained by Location-Based Services provided by network nodes in a distributed way. In this paper we choose to evaluate the performance of two hierarchical rendezvous location based-services, GLS (Grid Location Service) and HLS (Hierarchical Location Service) coupled to the GPSR routing protocol (Greedy Perimeter Stateless Routing) for Wireless Sensor Network. The simulations were performed using NS2 simulator to evaluate the performance and power of the two services in term of location overhead, the request travel time (RTT) and the query Success ratio (QSR). This work presents also a new scalability performance study of both GLS and HLS, specifically, what happens if the number of nodes N increases. The study will focus on three qualitative metrics: The location maintenance cost, the location query cost and the storage cost.

Keywords: location based-services, routing protocols, scalability, wireless sensor networks

Procedia PDF Downloads 372
920 Evaluation of Condyle Alterations after Orthognathic Surgery with a Digital Image Processing Technique

Authors: Livia Eisler, Cristiane C. B. Alves, Cristina L. F. Ortolani, Kurt Faltin Jr.

Abstract:

Purpose: This paper proposes a technically simple diagnosis method among orthodontists and maxillofacial surgeons in order to evaluate discrete bone alterations. The methodology consists of a protocol to optimize the diagnosis and minimize the possibility for orthodontic and ortho-surgical retreatment. Materials and Methods: A protocol of image processing and analysis, through ImageJ software and its plugins, was applied to 20 pairs of lateral cephalometric images obtained from cone beam computerized tomographies, before and 1 year after undergoing orthognathic surgery. The optical density of the images was analyzed in the condylar region to determine possible bone alteration after surgical correction. Results: Image density was shown to be altered in all image pairs, especially regarding the condyle contours. According to measures, condyle had a gender-related density reduction for p=0.05 and condylar contours had their alterations registered in mm. Conclusion: A simple, viable and cost-effective technique can be applied to achieve the more detailed image-based diagnosis, not depending on the human eye and therefore, offering more reliable, quantitative results.

Keywords: bone resorption, computer-assisted image processing, orthodontics, orthognathic surgery

Procedia PDF Downloads 160
919 Reconfigurable Consensus Achievement of Multi Agent Systems Subject to Actuator Faults in a Leaderless Architecture

Authors: F. Amirarfaei, K. Khorasani

Abstract:

In this paper, reconfigurable consensus achievement of a team of agents with marginally stable linear dynamics and single input channel has been considered. The control algorithm is based on a first order linear protocol. After occurrence of a LOE fault in one of the actuators, using the imperfect information of the effectiveness of the actuators from fault detection and identification module, the control gain is redesigned in a way to still reach consensus. The idea is based on the modeling of change in effectiveness as change of Laplacian matrix. Then as special cases of this class of systems, a team of single integrators as well as double integrators are considered and their behavior subject to a LOE fault is considered. The well-known relative measurements consensus protocol is applied to a leaderless team of single integrator as well as double integrator systems, and Gersgorin disk theorem is employed to determine whether fault occurrence has an effect on system stability and team consensus achievement or not. The analyses show that loss of effectiveness fault in actuator(s) of integrator systems affects neither system stability nor consensus achievement.

Keywords: multi-agent system, actuator fault, stability analysis, consensus achievement

Procedia PDF Downloads 337
918 Online Teaching and Learning Processes: Declarative and Procedural Knowledge

Authors: Eulalia Torras, Andreu Bellot

Abstract:

To know whether students’ achievements are the result of online interaction and not just a consequence of individual differences themselves, it seems essential to link the teaching presence and social presence to the types of knowledge built. The research aim is to analyze the social presence in relation to two types of knowledge, declarative and procedural. Qualitative methodology has been used. The analysis of the contents was based on an observation protocol that included community of enquiry indicators and procedural and declarative knowledge indicators. The research has been conducted in three phases that focused on an observational protocol and indicators, results and conclusions. Results show that the teaching-learning processes have been characterized by the patterns of presence and types of knowledge. Results also show the importance of social presence support provided by the teacher and the students, not only in regard to the nature of the instructional support but also concerning how it is presented to the student and the importance that is attributed to it in the teaching-learning process, that is, what it is that assistance is offered on. In this study, we find that the presence based on procedural guidelines and declarative reflection, the management of shared meaning on the basis of the skills and the evidence of these skills entail patterns of learning. Nevertheless, the importance that the teacher attributes to each support aspect has a bearing on the extent to which the students reflect more on the given task.

Keywords: education, online, teaching and learning processes, knowledge

Procedia PDF Downloads 216
917 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol

Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani

Abstract:

Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.

Keywords: heuristics routing, intelligent routing, VANET, route optimization

Procedia PDF Downloads 176
916 Multi Agent Based Pre-Hospital Emergency Management Architecture

Authors: Jaleh Shoshtarian Malak, Niloofar Mohamadzadeh

Abstract:

Managing pre-hospital emergency patients requires real-time practices and efficient resource utilization. Since we are facing a distributed Network of healthcare providers, services and applications choosing the right resources and treatment protocol considering patient situation is a critical task. Delivering care to emergency patients at right time and with the suitable treatment settings can save ones live and prevent further complication. In recent years Multi Agent Systems (MAS) introduced great solutions to deal with real-time, distributed and complicated problems. In this paper we propose a multi agent based pre-hospital emergency management architecture in order to manage coordination, collaboration, treatment protocol and healthcare provider selection between different parties in pre-hospital emergency in a self-organizing manner. We used AnyLogic Agent Based Modeling (ABM) tool in order to simulate our proposed architecture. We have analyzed and described the functionality of EMS center, Ambulance, Consultation Center, EHR Repository and Quality of Care Monitoring as main collaborating agents. Future work includes implementation of the proposed architecture and evaluation of its impact on patient quality of care improvement.

Keywords: multi agent systems, pre-hospital emergency, simulation, software architecture

Procedia PDF Downloads 426
915 Combined Effect of Gender Differences and Fatiguing Task on Unipedal Postural Balance and Functional Mobility in Adults with Multiple Sclerosis

Authors: Sonda Jallouli, Omar Hammouda, Imen Ben Dhia, Salma Sakka, Chokri Mhiri, Mohamed Habib Elleuch, Abedlmoneem Yahia, Sameh Ghroubi

Abstract:

Multiple sclerosis (MS) is characterized by gender differences with affecting women two to four times more than men, but the disease progression is faster and more severe in men. Fatigue represents one of the most frequent and disabling symptoms related to MS. Results of previous studies regarding gender differences in fatigue perception in MS persons are contradictory. Besides, fatigue has been shown to affect negatively postural balance and functional mobility in MS persons. However, no study has taken into account gender differences in the response of these physical parameters to a fatiguing protocol in MS persons. Given the reduction of autonomy due to the alteration of these parameters induced by fatigue and the importance of gender differences in postural balance training programs in fatigued men and women with MS, the aim of this study was to investigate the effect of gender difference on unipedal postural balance and functional mobility after performing a fatiguing task in MS adults. Methods: Eleven women (30.29 ± 7.99 years) and seven men (30.91 ± 8.19 years) with relapsing-remitting MS performed a fatiguing protocol: three sets of the 5×sit to stand test (5-STST), six-minute walk test (6MWT) followed by three sets of the 5-STST. Unipedal balance, functional mobility, and fatigue perception were measured prefatigue (T0) and post fatigue (T3) using a clinical unipedal balance test, timed up and go test (TUGT), and analogic visual scale of fatigue (VASF), respectively. Heart rate (HR) and rate of perceived exertion (RPE) were recorded before, during and after the fatiguing task. Results: Compared to women, men showed an impairment of unipedal balance on the dominant leg (p<0.001, d=0.52) and mobility (p<0.001, d=3) via reducing unipedal stance time and increasing duration of TUGT execution, respectively. No gender differences were observed in 6MWT, 5-STST, HR, RPE and VASF scores. Conclusion: Fatiguing protocol negatively affected unipedal postural balance and mobility only in men. These gender differences were inconclusive but can be taken into account in postural balance rehabilitation programs for persons with MS.

Keywords: functional mobility, fatiguing exercises, multiple sclerosis, sex differences, unipedal balance

Procedia PDF Downloads 138
914 Proposal of Commutation Protocol in Hybrid Sensors and Vehicular Networks for Intelligent Transport Systems

Authors: Taha Bensiradj, Samira Moussaoui

Abstract:

Hybrid Sensors and Vehicular Networks (HSVN), represent a hybrid network, which uses several generations of Ad-Hoc networks. It is used especially in Intelligent Transport Systems (ITS). The HSVN allows making collaboration between the Wireless Sensors Network (WSN) deployed on the border of the road and the Vehicular Network (VANET). This collaboration is defined by messages exchanged between the two networks for the purpose to inform the drivers about the state of the road, provide road safety information and more information about traffic on the road. Moreover, this collaboration created by HSVN, also allows the use of a network and the advantage of improving another network. For example, the dissemination of information between the sensors quickly decreases its energy, and therefore, we can use vehicles that do not have energy constraint to disseminate the information between sensors. On the other hand, to solve the disconnection problem in VANET, the sensors can be used as gateways that allow sending the messages received by one vehicle to another. However, because of the short communication range of the sensor and its low capacity of storage and processing of data, it is difficult to ensure the exchange of road messages between it and the vehicle, which can be moving at high speed at the time of exchange. This represents the time where the vehicle is in communication range with the sensor. This work is the proposition of a communication protocol between the sensors and the vehicle used in HSVN. The latter has as the purpose to ensure the exchange of road messages in the available time of exchange.

Keywords: HSVN, ITS, VANET, WSN

Procedia PDF Downloads 361
913 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks

Authors: Ruchi Makani, B. V. R. Reddy

Abstract:

Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.

Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system

Procedia PDF Downloads 177
912 Association of Post-Traumatic Stress Disorder with Work Performance amongst Emergency Medical Service Personnel, Karachi, Pakistan

Authors: Salima Kerai, Muhammad Islam, Uzma Khan, Nargis Asad, Junaid Razzak, Omrana Pasha

Abstract:

Background: Pre-hospital care providers are exposed to various kinds of stressors. Their daily exposure to diverse critical and traumatic incidents can lead to stress reactions like Post-Traumatic Stress Disorder (PTSD). Consequences of PTSD in terms of work loss can be catastrophic because of its compound effect on families, which affect them economically, socially and emotionally. Therefore, it is critical to assess the association between PTSD and Work performance in Emergency Medical Service (EMS) if exist any. Methods: This prospective observational study was carried out at AMAN EMS in Karachi, Pakistan. EMS personnel were screened for potential PTSD using impact of event scale-revised (IES-R). Work performance was assessed on basis of five variables; number of late arrivals to work, number of days absent, number of days sick, adherence to protocol and patient satisfaction survey over the period of 3 months. In order to model outcomes like number of late arrivals to work, days absent and days late; negative binomial regression was used whereas logistic regression was applied for adherence to protocol and linear for patient satisfaction scores. Results: Out of 536 EMS personnel, 525 were found to be eligible, of them 518 consented. However data on 507 were included because 7 left the job during study period. The mean score of PTSD was found to be 24.0 ± 12.2. However, weak and insignificant association was found between PTSD and work performance measures: number of late arrivals (RRadj 0.99; 95% CI 0.98-1.00), days absent (RRadj 0.98; 95% CI 0.96-0.99), days sick (Rradj 0.99; 95% CI 0.98 to 1.00), adherence to protocol (ORadj 1.01: 95% CI 0.99 to 1.04) and patient satisfaction (0.001% score; 95% CI -0.03% to 0.03%). Conclusion: No association was found between PTSD and Work performance in the selected EMS population in Karachi Pakistan. Further studies are needed to explore the phenomenon of resiliency in these populations. Moreover, qualitative work is required to explore perceptions and feelings like willingness to go to work, readiness to carry out job responsibilities.

Keywords: trauma, emergency medical service, stress, pakistan

Procedia PDF Downloads 337
911 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 184
910 Optrix: Energy Aware Cross Layer Routing Using Convex Optimization in Wireless Sensor Networks

Authors: Ali Shareef, Aliha Shareef, Yifeng Zhu

Abstract:

Energy minimization is of great importance in wireless sensor networks in extending the battery lifetime. One of the key activities of nodes in a WSN is communication and the routing of their data to a centralized base-station or sink. Routing using the shortest path to the sink is not the best solution since it will cause nodes along this path to fail prematurely. We propose a cross-layer energy efficient routing protocol Optrix that utilizes a convex formulation to maximize the lifetime of the network as a whole. We further propose, Optrix-BW, a novel convex formulation with bandwidth constraint that allows the channel conditions to be accounted for in routing. By considering this key channel parameter we demonstrate that Optrix-BW is capable of congestion control. Optrix is implemented in TinyOS, and we demonstrate that a relatively large topology of 40 nodes can converge to within 91% of the optimal routing solution. We describe the pitfalls and issues related with utilizing a continuous form technique such as convex optimization with discrete packet based communication systems as found in WSNs. We propose a routing controller mechanism that allows for this transformation. We compare Optrix against the Collection Tree Protocol (CTP) and we found that Optrix performs better in terms of convergence to an optimal routing solution, for load balancing and network lifetime maximization than CTP.

Keywords: wireless sensor network, Energy Efficient Routing

Procedia PDF Downloads 391
909 Independent Control over Surface Charge and Wettability Using Polyelectrolyte Architecture

Authors: Shanshan Guo, Xiaoying Zhu, Dominik Jańczewski, Koon Gee Neoh

Abstract:

Surface charge and wettability are two prominent physical factors governing cell adhesion and have been extensively studied in the literature. However, a comparison between the two driving forces in terms of their independent and cooperative effects in affecting cell adhesion is rarely explored on a systematic and quantitative level. Herein, we formulate a protocol which allows two-dimensional and independent control over both surface charge and wettability. This protocol enables the unambiguous comparison of the effects of these two properties on cell adhesion. This strategy is implemented by controlling both the relative thickness of polyion layers in the layer-by-layer assembly and the polyion side chain chemical structures. The 2D property matrix spans surface isoelectric point ranging from 5 to 9 and water contact angle from 35º to 70º, with other interferential factors (e.g. roughness) eliminated. The interplay between these two surface variables influences 3T3 fibroblast cell adhesion. The results show that both surface charge and wettability have an effect on its adhesion. The combined effects of positive charge and hydrophilicity led to the highest cell adhesion whereas negative charge and hydrophobicity led to the lowest cell adhesion. Our design strategy can potentially form the basis for studying the distinct behaviors of electrostatic force or wettability driven interfacial phenomena and serving as a reference in future studies assessing cell adhesion to surfaces with known charge and wettability within the property range studied here.

Keywords: cell adhesion, layer-by-layer, surface charge, surface wettability

Procedia PDF Downloads 270
908 A Protocol of Procedures and Interventions to Accelerate Post-Earthquake Reconstruction

Authors: Maria Angela Bedini, Fabio Bronzini

Abstract:

The Italian experiences, positive and negative, of the post-earthquake are conditioned by long times and structural bureaucratic constraints, also motivated by the attempt to contain mafia infiltration and corruption. The transition from the operational phase of the emergency to the planning phase of the reconstruction project is thus hampered by a series of inefficiencies and delays, incompatible with the need for rapid recovery of the territories in crisis. In fact, intervening in areas affected by seismic events means at the same time associating the reconstruction plan with an urban and territorial rehabilitation project based on strategies and tools in which prevention and safety play a leading role in the regeneration of territories in crisis and the return of the population. On the contrary, the earthquakes that took place in Italy have instead further deprived the territories affected of the minimum requirements for habitability, in terms of accessibility and services, accentuating the depopulation process, already underway before the earthquake. The objective of this work is to address with implementing and programmatic tools the procedures and strategies to be put in place, today and in the future, in Italy and abroad, to face the challenge of the reconstruction of activities, sociality, services, risk mitigation: a protocol of operational intentions and firm points, open to a continuous updating and implementation. The methodology followed is that of the comparison in a synthetic form between the different Italian experiences of the post-earthquake, based on facts and not on intentions, to highlight elements of excellence or, on the contrary, damage. The main results obtained can be summarized in technical comparison cards on good and bad practices. With this comparison, we intend to make a concrete contribution to the reconstruction process, certainly not only related to the reconstruction of buildings but privileging the primary social and economic needs. In this context, the recent instrument applied in Italy of the strategic urban and territorial SUM (Minimal Urban Structure) and the strategic monitoring process become dynamic tools for supporting reconstruction. The conclusions establish, by points, a protocol of interventions, the priorities for integrated socio-economic strategies, multisectoral and multicultural, and highlight the innovative aspects of 'inversion' of priorities in the reconstruction process, favoring the take-off of 'accelerator' interventions social and economic and a more updated system of coexistence with risks. In this perspective, reconstruction as a necessary response to the calamitous event can and must become a unique opportunity to raise the level of protection from risks and rehabilitation and development of the most fragile places in Italy and abroad.

Keywords: an operational protocol for reconstruction, operational priorities for coexistence with seismic risk, social and economic interventions accelerators of building reconstruction, the difficult post-earthquake reconstruction in Italy

Procedia PDF Downloads 127
907 Islamic Banking Adoption Model from Technology Prospective

Authors: Amer Alzaidi

Abstract:

Islamic banking is an alternative solution to those people who are worried about Riba (interest) in all forms of transaction while using banking services and products. Today, banks around the world have Islamic banking services and products the in one form or another. The use of Islamic banking is not only restricted to Muslims world but have reached to non-Muslim countries like UK, USA, Australia and Canada as well. Compared to conventional banking, the adoption rate of Islamic banking is low because of unawareness of customers, financial cost, and performance issues. The interest in Islamic banking by financial institutions as well as low adoption rate motivated us to look this matter into detail in order to identify Critical Success Factors, which are positively motivating customers to use Islamic banking services/ products and Critical Risk Factors, which have significantly negative effect on the adoption of Islamic banking. The CSFs and CRFs will be initially identified from the literature using methodology called Systematic Literature Review, followed by the empirical analysis of these factors using survey research method. Later, we will develop Islamic Banking Adoption Model (IBAM) to help banks to assess their Islamic banking strategic positioning and to improve their operational efficiency. The first potential contribution of this research study will be the development of IBAM protocol that will provide us guidelines for conducting our actual SLR. The second major contribution of this research will be the development of Islamic Banking Adoption Model (IBAM), and the third contribution of this research study will be the evaluation of the developed IBMA.

Keywords: Islamic banking, adoption model, protocol, technology

Procedia PDF Downloads 279
906 Ex Situ Conservation of Neutraceutical Banana-Musa paradisiaca cv. Karibale Monthan

Authors: V. Krishna, Shashikumar

Abstract:

Edible Bananas (Musa spp.) are the major staple food for rural and urban consumers in India and an important source of rural income. The cultivar Musa paradisiaca cv. Karibale Monthan is an endemic cultivar of Malnad region of Karnataka and used as a glomolueroprotective neutraceutical to solve kidney problems. The protocol for mass multiplication of plantlets for this indigenous banana cultivar Karibale Monthan has not yet been standardized so far. In the present study, an attempt has been made to develop high frequency in vitro regeneration protocol and evaluation of morphoagronomic characteristics in the farmyard. The high frequency shoot initiation (93.33 %) was recorded at the synergetic effect of BAP (2 to 8mg/L), TDZ (0.1 to 1.2mg/L) and coconut water (0.1 to 1.2ml/L). It was optimized at the concentration 5 mg/l BAP, 0.5 mg/l TDZ and 0.5 ml/l coconut water with 15.90 ± 1.66 frequency of shoots per propagule. Supplementation of 1.0 mg/l IBA induces 5.33 ± 1.21 numbers of roots with a mean root length of 7.50 ± 1.87 roots. 99% of plantlets with distinct roots and shoots were successfully acclimatized in the green house and transferred to the field to evaluate the agro-morphological variations. The micropropagated plants showed significantly higher morphometric values for height of the plant (16.80±2.17), number of leaves (12.40±1.14), length of the bunch (56.20±2.17), weight of the bunch (13.60±1.14), number of hands in a bunch (11.40±1.14) and girth of the pseudostem (49.80±1.48) when compared with in vivo plants.

Keywords: banana cv. Karibale Monthan, neutraceutical, high-frequency regeneration, morphometric evaluation

Procedia PDF Downloads 287
905 Trafficking of Women and Children and Solutions to Combat It: The Case of Nigeria

Authors: Olatokunbo Yakeem

Abstract:

Human trafficking is a crime against gross violations of human rights. Trafficking in persons is a severe socio-economic dilemma that affects the national and international dimensions. Human trafficking or modern-day-slavery emanated from slavery, and it has been in existence before the 6ᵗʰ century. Today, no country is exempted from dehumanizing human beings, and as a result, it has been an international issue. The United Nations (UN) presented the International Protocol to fight human trafficking worldwide, which brought about the international definition of human trafficking. The protocol is to prevent, suppress, and punish trafficking in persons, especially women and children. The trafficking protocol has a link with transnational organised crime rather than migration. Over a hundred and fifty countries nationwide have enacted their criminal and panel code trafficking legislation from the UN trafficking protocol. Sex trafficking is the most common type of exploitation of women and children. Other forms of this crime involve exploiting vulnerable victims through forced labour, child involvement in warfare, domestic servitude, debt bondage, and organ removal for transplantation. Trafficking of women and children into sexual exploitation represents the highest form of human trafficking than other types of exploitation. Trafficking of women and children can either happen internally or across the border. It affects all kinds of people, regardless of their race, social class, culture, religion, and education levels. However, it is more of a gender-based issue against females. Furthermore, human trafficking can lead to life-threatening infections, mental disorders, lifetime trauma, and even the victim's death. The study's significance is to explore why the root causes of women and children trafficking in Nigeria are based around poverty, entrusting children in the hands of relatives and friends, corruption, globalization, weak legislation, and ignorance. The importance of this study is to establish how the national, regional, and international organisations are using the 3P’s Protection, Prevention, and Prosecution) to tackle human trafficking. The methodology approach for this study will be a qualitative paradigm. The rationale behind this selection is that the qualitative method will identify the phenomenon and interpret the findings comprehensively. The data collection will take the form of semi-structured in-depth interviews through telephone and email. The researcher will use a descriptive thematic analysis to analyse the data by using complete coding. In summary, this study aims to recommend to the Nigerian federal government to include human trafficking as a subject in their educational curriculum for early intervention to prevent children from been coerced by criminal gangs. And the research aims to find the root causes of women and children trafficking. Also, to look into the effectiveness of the strategies in place to eradicate human trafficking globally. In the same vein, the research objective is to investigate how the anti-trafficking bodies such as law enforcement and NGOs collaborate to tackle the upsurge in human trafficking.

Keywords: children, Nigeria, trafficking, women

Procedia PDF Downloads 183
904 Hardware in the Loop Platform for Virtual Commissioning: Case Study of a Hydraulic-Press Model Simulated in Real-Time

Authors: Jorge Rodriguez-Guerra, Carlos Calleja, Aron Pujana, Ana Maria Macarulla

Abstract:

Hydraulic-press commissioning consumes a great amount of man-hours, due to the fact that it takes place several miles away from where it has been designed. This factor became exacerbated due to control designers’ lack of knowledge about which will be the final controller gains before they start working with it. Virtual commissioning has been postulated as an optimal solution to deal with this lack of knowledge. Here, a case study is presented in which a controller is set up against a real-time model based on a hydraulic-press. The press model is designed following manufacturer specifications and it is embedded in a real-time simulator. This methodology ensures that the model achieves similar responses as the real machine that would be placed on the industry. A deterministic communication protocol is in charge of the bidirectional information transmission between the real-time model and the controller. This platform allows the engineer to test and verify the final control responses with exactly the same hardware that is going to be installed in the hydraulic-press, in other words, realize a virtual commissioning of the electro-hydraulic actuator. The Hardware in the Loop (HiL) platform validates in laboratory conditions and harmless for the machine the control algorithms designed, which allows embedding them afterwards in the industrial environment without further modifications.

Keywords: deterministic communication protocol, electro-hydraulic actuator, hardware in the loop, real-time, virtual commissioning

Procedia PDF Downloads 142
903 Therapeutic Hypothermia Post Cardiac Arrest

Authors: Tahsien Mohamed Okasha

Abstract:

We hypothesized that Post cardiac arrest patients with Glasgow coma scale (GCS) score of less than (8) and who will be exposed to therapeutic hypothermia protocol will exhibit improvement in their neurological performance. Purposive sample of 17 patients who were fulfilling the inclusion criteria during one year collected. The study carried out using Quasi-experimental research design. Four Tools used for data collection of this study: Demographic and medical data sheet, Post cardiac arrest health assessment sheet, Bedside Shivering Assessment Scale (BSAS), and Glasgow Pittsburgh cerebral performance category scale (CPC). Result: the mean age was X̅ ± SD = 53 ± 8.122 years, 47.1% were arrested because of cardiac etiology. 35.3% with initial arrest rhythm ventricular tachycardia (VT), 23.5% with ventricular fibrillation (VF), and 29.4% with A-Systole. Favorable neurological outcome was seen among 70.6%. There was significant statistical difference in WBC, Platelets, blood gases value, random blood sugar. Also Initial arrest rhythm, etiology of cardiac arrest, and shivering status were significantly correlated with cerebral performance categories score. therapeutic hypothermia has positive effects on neurological performance among post cardiac arrest patients with GCS score of less than (8). replication of the study on larger probability sample, with randomized control trial design. Further study for suggesting nursing protocol for patients undergoing therapeutic hypothermia.

Keywords: therapeutic hypothermia, neurological performance, after resuscitation from cardiac arrest., resuscitation

Procedia PDF Downloads 96
902 Gingival Tissue Appearance Changes According Hormonal Oscillations at Female Patients

Authors: Ilma Robo, Saimir Heta, Vera Ostreni, Elsaida Agrushi, Eduart Kapaj

Abstract:

Introduction: Cyclic hormonal fluctuations are known from literature to have a clinically visible effects on gingival tissue reactions, to the diagnosed processes of gingival inflammation. Materials and methods: At a total of 47 female patients, ad-hock presented at the University Clinic, were recorded data on effect of hormonal oscillations at periodontal treatment protocol. Oral examination was performed on soft tissue of gingiva and the oral mucous membrane, always respecting the air-drying procedure and then checking with free eye differences in oral mucosal relief. After the patients were informed about the study protocol, the purpose of the study and the ongoing procedure, verbal consensus was required. Results: The study was conducted in a total of 47 patients, out of which 13 patients were under the gingivitis classification, and 24 patients under the periodontal classification. Patients included in the study are divided by age, cycle week respectively 1,2,3 and 4.The younger age of female patients is more prone to the appearance of gingivitis, which is further aggravated by the effects of sexual hormones and the effect of the controlled or non-regulated fluctuations of the latter. Conclusions: The healing process is more fuel-intensive in the absence of high hormone levels, as they are these pro-inflammatory hormones, both in or near the ho Younger women are more open to volunteering in studies that record individual and study data that may last in time.

Keywords: gingiva, hormonal oscillations, female patients, mucosa, periodontal non-surgical treatment

Procedia PDF Downloads 81