Search results for: Acute heart attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2567

Search results for: Acute heart attacks

2507 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 178
2506 Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security

Authors: Godiya Atsiya Pius

Abstract:

The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond.

Keywords: insurgency, gender, violence, security, vulnerable groups

Procedia PDF Downloads 441
2505 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution

Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla

Abstract:

The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.

Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad

Procedia PDF Downloads 54
2504 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 55
2503 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 158
2502 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 202
2501 Admission C-Reactive Protein Serum Levels and In-Hospital Mortality in the Elderly Admitted to the Acute Geriatrics Department

Authors: Anjelika Kremer, Irina Nachimov, Dan Justo

Abstract:

Background: C-reactive protein (CRP) serum levels are commonly measured in hospitalized patients. Elevated admission CRP serum levels and in-hospital mortality has been seldom studied in the general population of elderly patients admitted to the acute Geriatrics department. Methods: A retrospective cross-sectional study was conducted at a tertiary medical center. Included were all elderly patients (age 65 years or more) admitted to a single acute Geriatrics department from the emergency room between April 2014 and January 2015. CRP serum levels were measured routinely in all patients upon the first 24 hours of admission. A logistic regression analysis was used to study if admission CRP serum levels were associated with in-hospital mortality independent of age, gender, functional status, and co-morbidities. Results: Overall, 498 elderly patients were included in the analysis: 306 (61.4%) female patients and 192 (38.6%) male patients. The mean age was 84.8±7.0 years (median: 85 years; IQR: 80-90 years). The mean admission CRP serum levels was 43.2±67.1 mg/l (median: 13.1 mg/l; IQR: 2.8-51.7 mg/l). Overall, 33 (6.6%) elderly patients died during the hospitalization. A logistic regression analysis showed that in-hospital mortality was independently associated with history of stroke (p < 0.0001), heart failure (p < 0.0001), and admission CRP serum levels (p < 0.0001) – and to a lesser extent with age (p = 0.042), collagen vascular disease (p=0.011), and recent venous thromboembolism (p=0.037). Receiver operating characteristic (ROC) curve showed that admission CRP serum levels predict in-hospital mortality fairly with an area under the curve (AUC) of 0.694 (p < 0.0001). Cut-off value with maximal sensitivity and specificity was 19.7 mg/L. Conclusions: Admission CRP serum levels may be used to predict in-hospital mortality in the general population of elderly patients admitted to the acute Geriatrics department.

Keywords: c-reactive protein, elderly, mortality, prediction

Procedia PDF Downloads 215
2500 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 52
2499 Challenges of Management of Acute Pancreatitis in Low Resource Setting

Authors: Md. Shakhawat Hossain, Jimma Hossain, Md. Naushad Ali

Abstract:

Acute pancreatitis is a dangerous medical emergency in the practice of gastroenterology. Management of acute pancreatitis needs multidisciplinary approach with support starts from emergency to ICU. So, there is a chance of mismanagement in every steps, especially in low resource settings. Other factors such as patient’s financial condition, education, social custom, transport facility, referral system from periphery may also challenge the current guidelines for management. The present study is intended to determine the clinico-pathological profile, severity assessment and challenges of management of acute pancreatitis in a government laid tertiary care hospital to image the real scenario of management in a low resource place. A total 100 patients of acute pancreatitis were studied in this prospective study, held in the Department of Gastroenterology, Rangpur medical college hospital, Bangladesh from July 2017 to July 2018 within one year. Regarding severity, 85 % of the patients were mild, whereas 13 were moderately severe, and 2 had severe acute pancreatitis according to the revised Atlanta criteria. The most common etiologies of acute pancreatitis in our study were gall stone (15%) and biliary sludge (15%), whereas 54% were idiopathic. The most common challenges we faced were delay in hospital admission (59%) and delay in hospital diagnosis (20%). Others are non-adherence of patient party, and lack of investigation facility, physician’s poor knowledge about current guidelines. We were able to give early aggressive fluid to only 18% of patients as per current guideline. Conclusion: Management of acute pancreatitis as per guideline is challenging when optimum facility is lacking. So, modified guidelines for assessment and management of acute pancreatitis should be prepared for low resource setting.

Keywords: acute pancreatitis, challenges of management, severity, prognosis

Procedia PDF Downloads 100
2498 Relationship between Different Heart Rate Control Levels and Risk of Heart Failure Rehospitalization in Patients with Persistent Atrial Fibrillation: A Retrospective Cohort Study

Authors: Yongrong Liu, Xin Tang

Abstract:

Background: Persistent atrial fibrillation is a common arrhythmia closely related to heart failure. Heart rate control is an essential strategy for treating persistent atrial fibrillation. Still, the understanding of the relationship between different heart rate control levels and the risk of heart failure rehospitalization is limited. Objective: The objective of the study is to determine the relationship between different levels of heart rate control in patients with persistent atrial fibrillation and the risk of readmission for heart failure. Methods: We conducted a retrospective dual-centre cohort study, collecting data from patients with persistent atrial fibrillation who received outpatient treatment at two tertiary hospitals in central and western China from March 2019 to March 2020. The collected data included age, gender, body mass index (BMI), medical history, and hospitalization frequency due to heart failure. Patients were divided into three groups based on their heart rate control levels: Group I with a resting heart rate of less than 80 beats per minute, Group II with a resting heart rate between 80 and 100 beats per minute, and Group III with a resting heart rate greater than 100 beats per minute. The readmission rates due to heart failure within one year after discharge were statistically analyzed using propensity score matching in a 1:1 ratio. Differences in readmission rates among the different groups were compared using one-way ANOVA. The impact of varying levels of heart rate control on the risk of readmission for heart failure was assessed using the Cox proportional hazards model. Binary logistic regression analysis was employed to control for potential confounding factors. Results: We enrolled a total of 1136 patients with persistent atrial fibrillation. The results of the one-way ANOVA showed that there were differences in readmission rates among groups exposed to different levels of heart rate control. The readmission rates due to heart failure for each group were as follows: Group I (n=432): 31 (7.17%); Group II (n=387): 11.11%; Group III (n=317): 90 (28.50%) (F=54.3, P<0.001). After performing 1:1 propensity score matching for the different groups, 223 pairs were obtained. Analysis using the Cox proportional hazards model showed that compared to Group I, the risk of readmission for Group II was 1.372 (95% CI: 1.125-1.682, P<0.001), and for Group III was 2.053 (95% CI: 1.006-5.437, P<0.001). Furthermore, binary logistic regression analysis, including variables such as digoxin, hypertension, smoking, coronary heart disease, and chronic obstructive pulmonary disease as independent variables, revealed that coronary heart disease and COPD also had a significant impact on readmission due to heart failure (p<0.001). Conclusion: The correlation between the heart rate control level of patients with persistent atrial fibrillation and the risk of heart failure rehospitalization is positive. Reasonable heart rate control may significantly reduce the risk of heart failure rehospitalization.

Keywords: heart rate control levels, heart failure rehospitalization, persistent atrial fibrillation, retrospective cohort study

Procedia PDF Downloads 45
2497 Intelligent Prediction System for Diagnosis of Heart Attack

Authors: Oluwaponmile David Alao

Abstract:

Due to an increase in the death rate as a result of heart attack. There is need to develop a system that can be useful in the diagnosis of the disease at the medical centre. This system will help in preventing misdiagnosis that may occur from the medical practitioner or the physicians. In this research work, heart disease dataset obtained from UCI repository has been used to develop an intelligent prediction diagnosis system. The system is modeled on a feedforwad neural network and trained with back propagation neural network. A recognition rate of 86% is obtained from the testing of the network.

Keywords: heart disease, artificial neural network, diagnosis, prediction system

Procedia PDF Downloads 421
2496 An Auxiliary Technique for Coronary Heart Disease Prediction by Analyzing Electrocardiogram Based on ResNet and Bi-Long Short-Term Memory

Authors: Yang Zhang, Jian He

Abstract:

Heart disease is one of the leading causes of death in the world, and coronary heart disease (CHD) is one of the major heart diseases. Electrocardiogram (ECG) is widely used in the detection of heart diseases, but the traditional manual method for CHD prediction by analyzing ECG requires lots of professional knowledge for doctors. This paper introduces sliding window and continuous wavelet transform (CWT) to transform ECG signals into images, and then ResNet and Bi-LSTM are introduced to build the ECG feature extraction network (namely ECGNet). At last, an auxiliary system for coronary heart disease prediction was developed based on modified ResNet18 and Bi-LSTM, and the public ECG dataset of CHD from MIMIC-3 was used to train and test the system. The experimental results show that the accuracy of the method is 83%, and the F1-score is 83%. Compared with the available methods for CHD prediction based on ECG, such as kNN, decision tree, VGGNet, etc., this method not only improves the prediction accuracy but also could avoid the degradation phenomenon of the deep learning network.

Keywords: Bi-LSTM, CHD, ECG, ResNet, sliding window

Procedia PDF Downloads 55
2495 Wavelet-Based Classification of Myocardial Ischemia, Arrhythmia, Congestive Heart Failure and Sleep Apnea

Authors: Santanu Chattopadhyay, Gautam Sarkar, Arabinda Das

Abstract:

This paper presents wavelet based classification of various heart diseases. Electrocardiogram signals of different heart patients have been studied. Statistical natures of electrocardiogram signals for different heart diseases have been compared with the statistical nature of electrocardiograms for normal persons. Under this study four different heart diseases have been considered as follows: Myocardial Ischemia (MI), Congestive Heart Failure (CHF), Arrhythmia and Sleep Apnea. Statistical nature of electrocardiograms for each case has been considered in terms of kurtosis values of two types of wavelet coefficients: approximate and detail. Nine wavelet decomposition levels have been considered in each case. Kurtosis corresponding to both approximate and detail coefficients has been considered for decomposition level one to decomposition level nine. Based on significant difference, few decomposition levels have been chosen and then used for classification.

Keywords: arrhythmia, congestive heart failure, discrete wavelet transform, electrocardiogram, myocardial ischemia, sleep apnea

Procedia PDF Downloads 103
2494 Real-Time Nonintrusive Heart Rate Measurement: Comparative Case Study of LED Sensorics' Accuracy and Benefits in Heart Monitoring

Authors: Goran Begović

Abstract:

In recent years, many researchers are focusing on non-intrusive measuring methods when it comes to human biosignals. These methods provide solutions for everyday use, whether it’s health monitoring or finessing the workout routine. One of the biggest issues with these solutions is that the sensors’ accuracy is highly variable due to many factors, such as ambiental light, skin color diversity, etc. That is why we wanted to explore different outcomes under those kinds of circumstances in order to find the most optimal algorithm(s) for extracting heart rate (HR) information. The optimization of such algorithms can benefit the wider, cheaper, and safer application of home health monitoring, without having to visit medical professionals as often when it comes to observing heart irregularities. In this study, we explored the accuracy of infrared (IR), red, and green LED sensorics in a controlled environment and compared the results with a medically accurate ECG monitoring device.

Keywords: data science, ECG, heart rate, holter monitor, LED sensors

Procedia PDF Downloads 93
2493 Comparison of Computerized Dynamic Posturography and Functional Head Impulse Test Scores after of Hatha Yoga Practice and Resistance-Based Aerobic Exercise in Adult Female Yoga Practitioners

Authors: Çağla Aras, Kübra Bi̇nay, Aysberg Şamil önlü, Mine Baydan Aran, Dicle Aras

Abstract:

The purpose of the present research was to investigate the acute effects of 30-min hatha yoga and 30-min resistance-based aerobic exercise (RBAE) on computerized dynamic posturography (CDP) and functional head impulse test (fHIT) scores in adult female yoga practitioners. To reach this aim, ten participants executed CDP and fHIT three times in total: at rest, after yoga, and after RBAE. The yoga practice lasted a total of 30 minutes, including 25 min of asanas and 5 minutes of savasana. RBAE lasted a total of 30 minutes with an intensity of 70-75% of the heart rate reserve method. When the results were examined, no change was observed in any parameters of the fHIT scores due to resting or exercise implementation. On the contrary, some changes were observed in CDP test results depending on the type of exercise. The post-RBAE somatosensory and visual systems values were higher than resting (p<0.05). The composite balance score derived after RBAE was found to be improved when compared to post-yoga and resting values (p<0.01). Lastly, the post-RBAE vestibular system score was found to be statistically significantly higher than the post-Yoga values. In addition, it was observed that body composition parameters, especially decreasing BW, LBM, PBF, MBF and TBW, were associated with improved postural stability values. According to the results, it can be stated that neither hatha yoga nor resistance-based aerobic exercise has an acute effect on functional vestibulo-ocular reflex. In addition, although there was no change in balance level after yoga, it was observed that RBAE performed at 70-75% of the heart rate reserve and for 30 minutes had positive acute effects on postural stability and balance.

Keywords: hatha yoga, resistance training, aerobic training, high intensity training, computerized dynamic posturography, functional head impulse test

Procedia PDF Downloads 8
2492 Computational Fluid Dynamics Simulation and Comparison of Flow through Mechanical Heart Valve Using Newtonian and Non-Newtonian Fluid

Authors: D. Šedivý, S. Fialová

Abstract:

The main purpose of this study is to show differences between the numerical solution of the flow through the artificial heart valve using Newtonian or non-Newtonian fluid. The simulation was carried out by a commercial computational fluid dynamics (CFD) package based on finite-volume method. An aortic bileaflet heart valve (Sorin Bicarbon) was used as a pattern for model of real heart valve replacement. Computed tomography (CT) was used to gain the accurate parameters of the valve. Data from CT were transferred in the commercial 3D designer, where the model for CFD was made. Carreau rheology model was applied as non-Newtonian fluid. Physiological data of cardiac cycle were used as boundary conditions. Outputs were taken the leaflets excursion from opening to closure and the fluid dynamics through the valve. This study also includes experimental measurement of pressure fields in ambience of valve for verification numerical outputs. Results put in evidence a favorable comparison between the computational solutions of flow through the mechanical heart valve using Newtonian and non-Newtonian fluid.

Keywords: computational modeling, dynamic mesh, mechanical heart valve, non-Newtonian fluid

Procedia PDF Downloads 355
2491 Combination of Lamotrigine and Duloxetine: A Potential Approach for the Treatment of Acute Bipolar Depression

Authors: Kedar S. Prabhavalkar, Nimmy Baby Poovanpallil

Abstract:

Lamotrigine is approved for maintenance treatment of bipolar I disorder. However, its role in the treatment of acute bipolar depression is not well clear. Its efficacy in the treatment of major depressive disorders including refractory unipolar depression suggested the use of lamotrigine as an augmentation drug for acute bipolar depression. The present study aims to evaluate and perform a comparative analysis of the therapeutic effects of lamotrigine, an epileptic mood stabilizer, when used alone and in combination with duloxetine in treating acute bipolar depression at different doses of lamotrigine. Male swiss albino mice were used. For evaluation of efficacy of combination, immobility period was analyzed 30 min after the treatment from forced swim and tail suspension tests. Further amount of sucrose consumed in sucrose preference test was estimated. The combination of duloxetine and lamotrigine showed potentiation of antidepressant activity in acute models. Decrease in immobility time and increase in the amount of sucrose consumption in stressed mice were higher in combined group compared to lamotrigine monotherapy group. Brain monoamine levels were also attenuated more with combination compared to monotherapy. Results of the present study suggest potential role of lamotrigine and duloxetine combination in the treatment of acute bipolar depression.

Keywords: lamotrigine, duloxetine, acute bipolar depression, augmentation

Procedia PDF Downloads 473
2490 The Effect of Heart Rate and Valence of Emotions on Perceived Intensity of Emotion

Authors: Madeleine Nicole G. Bernardo, Katrina T. Feliciano, Marcelo Nonato A. Nacionales III, Diane Frances M. Peralta, Denise Nicole V. Profeta

Abstract:

This study aims to find out if heart rate variability and valence of emotion have an effect on perceived intensity of emotion. Psychology undergraduates (N = 60) from the University of the Philippines Diliman were shown 10 photographs from the Japanese Female Facial Expression (JAFFE) Database, along with a corresponding questionnaire with a Likert scale on perceived intensity of emotion. In this 3 x 2 mixed subjects factorial design, each group was either made to do a simple exercise prior to answering the questionnaire in order to increase the heart rate, listen to a heart rate of 120 bpm, or colour a drawing to keep the heart rate stable. After doing the activity, the participants then answered the questionnaire, providing a rating of the faces according to the participants’ perceived emotional intensity on the photographs. The photographs presented were either of positive or negative emotional valence. The results of the experiment showed that neither an induced fast heart rate or perceived fast heart rate had any significant effect on the participants’ perceived intensity of emotion. There was also no interaction effect of heart rate variability and valence of emotion. The insignificance of results was explained by the Philippines’ high context culture, accompanied by the prevalence of both intensely valenced positive and negative emotions in Philippine society. Insignificance in the effects were also attributed to the Cannon-Bard theory, Schachter-Singer theory and various methodological limitations.

Keywords: heart rate variability, perceived intensity of emotion, Philippines , valence of emotion

Procedia PDF Downloads 219
2489 The Cardiac Diagnostic Prediction Applied to a Designed Holter

Authors: Leonardo Juan Ramírez López, Javier Oswaldo Rodriguez Velasquez

Abstract:

We have designed a Holter that measures the heart´s activity for over 24 hours, implemented a prediction methodology, and generate alarms as well as indicators to patients and treating physicians. Various diagnostic advances have been developed in clinical cardiology thanks to Holter implementation; however, their interpretation has largely been conditioned to clinical analysis and measurements adjusted to diverse population characteristics, thus turning it into a subjective examination. This, however, requires vast population studies to be validated that, in turn, have not achieved the ultimate goal: mortality prediction. Given this context, our Insight Research Group developed a mathematical methodology that assesses cardiac dynamics through entropy and probability, creating a numerical and geometrical attractor which allows quantifying the normalcy of chronic and acute disease as well as the evolution between such states, and our Tigum Research Group developed a holter device with 12 channels and advanced computer software. This has been shown in different contexts with 100% sensitivity and specificity results.

Keywords: attractor , cardiac, entropy, holter, mathematical , prediction

Procedia PDF Downloads 136
2488 Acute Asthma in Emergency Department, Prevalence of Respiratory and Non-Respiratory Symptoms

Authors: Sherif Refaat, Hassan Aref

Abstract:

Background: Although asthma is a well-identified presentation to the emergency department, little is known about the frequency and percentage of respiratory and non-respiratory symptoms in patients with acute asthma in the emergency department (ED). Objective: The aim of this study is to identify the relationship between acute asthma exacerbation and different respiratory and non-respiratory symptoms including chest pain encountered by patients visiting the emergency department. Subjects and methods: Prospective study included 169 (97 females and 72 males) asthmatic patients who were admitted to emergency department of two tertiary care facility hospitals for asthma exacerbation from the period of September 2010 to August 2013, an anonyms questionnaire was used to collect symptoms and analysis of symptoms. Results: Females were 97 (57%) of the patients, mean age was 35.6 years; dyspnea on exertion was the commonest symptom accounting for 161 (95.2%) of patients, followed by dyspnea at rest 155 (91.7%), wheezing in 152 (89.9%), chest pain was present in 82 patients (48.5%), the pain was burning in 36 (43.9%) of the total patients with chest pain. Non-respiratory symptoms were seen frequently in acute asthma in ED. Conclusions: Dyspnea was the commonest chest symptoms encountered in patients with acute asthma followed by wheezing. Chest pain in acute asthma is a common symptom and should be fully studied to exclude misdiagnosis as of cardiac origin; there is a need for a better dissemination of knowledge about this disease association with chest pain. It was also noted that other non-respiratory symptoms are frequently encountered with acute asthma in emergency department.

Keywords: asthma, emergency department, respiratory symptoms, non respiratory system

Procedia PDF Downloads 396
2487 Diagnostic Value of CT Scan in Acute Appendicitis

Authors: Maria Medeiros, Suren Surenthiran, Abitha Muralithar, Soushma Seeburuth, Mohammed Mohammed

Abstract:

Introduction: Appendicitis is the most common surgical emergency globally and can have devastating consequences. Diagnostic imaging in acute appendicitis has become increasingly common in aiding the diagnosis of acute appendicitis. Computerized tomography (CT) and ultrasound (US) are the most commonly used imaging modalities for diagnosing acute appendicitis. Pre-operative imaging has contributed to a reduction of negative appendicectomy rates from between 10-29% to 5%. Literature report CT scan has a diagnostic sensitivity of 94% in acute appendicitis. This clinical audit was conducted to establish if the CT scan's diagnostic yield for acute appendicitis matches the literature. CT scan has a high sensitivity and specificity for diagnosing acute appendicitis and its use can result in a lower negative appendicectomy rate. The aim of this study is to compare the pre-operative imaging findings from CT scans to the histopathology results post-operatively and establish the accuracy of CT scans in aiding the diagnosis of acute appendicitis. Methods: This was a retrospective study focusing on adult presentations to the general surgery department in a district general hospital in central London with an impression of acute appendicitis. We analyzed all patients from July 2022 to December 2022 who underwent a CT scan preceding appendicectomy. Pre-operative CT findings and post-operative histopathology findings were compared to establish the efficacy of CT scans in diagnosing acute appendicitis. Our results were also cross-referenced with pre-existing literature. Data was collected and anonymized using CERNER and analyzed in Microsoft Excel. Exclusion criteria: Children, age <16. Results: 65 patients had CT scans in which the report stated acute appendicitis. Of those 65 patients, 62 patients underwent diagnostic laparoscopies. 100% of patients who underwent an appendicectomy with a pre-operative CT scan showing acute appendicitis had acute appendicitis in histopathology analysis. 3 of the 65 patients who had a CT scan showing appendicitis received conservative treatment. Conclusion: CT scans positive for acute appendicitis had 100% sensitivity and a positive predictive value, which matches published research studies (sensitivity of 94%). The use of CT scans in the diagnostic work-up for acute appendicitis can be extremely helpful in a) confirming the diagnosis and b) reducing the rates of negative appendicectomies and consequently reducing unnecessary operative-associated risks for patients, reducing costs and reducing pressure on emergency theatre lists.

Keywords: acute apendicitis, CT scan, general surgery, imaging

Procedia PDF Downloads 52
2486 Cardiovascular Disease Prediction Using Machine Learning Approaches

Authors: P. Halder, A. Zaman

Abstract:

It is estimated that heart disease accounts for one in ten deaths worldwide. United States deaths due to heart disease are among the leading causes of death according to the World Health Organization. Cardiovascular diseases (CVDs) account for one in four U.S. deaths, according to the Centers for Disease Control and Prevention (CDC). According to statistics, women are more likely than men to die from heart disease as a result of strokes. A 50% increase in men's mortality was reported by the World Health Organization in 2009. The consequences of cardiovascular disease are severe. The causes of heart disease include diabetes, high blood pressure, high cholesterol, abnormal pulse rates, etc. Machine learning (ML) can be used to make predictions and decisions in the healthcare industry. Thus, scientists have turned to modern technologies like Machine Learning and Data Mining to predict diseases. The disease prediction is based on four algorithms. Compared to other boosts, the Ada boost is much more accurate.

Keywords: heart disease, cardiovascular disease, coronary artery disease, feature selection, random forest, AdaBoost, SVM, decision tree

Procedia PDF Downloads 127
2485 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 204
2484 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 370
2483 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
2482 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 380
2481 Gender Features of Left Ventricular Myocardial Remodeling and the Development of Chronic Heart Failure in Patients with Postinfarction Cardiosclerosis

Authors: G. Dadashova, A. Bakhshaliyev

Abstract:

Aim: Determine gender differences in the etiology and clinical outcomes, as well as in the remodeling of the left ventricle (LV) in patients with chronic heart failure (CHF), suffering from arterial hypertension (AH) and coronary heart disease (CHD). Material and methods: The study included 112 patients of both sexes; aged 45 to 60 years with postinfarction cardiosclerosis had functional class (FC) heart failure II-IV of NYHA which were examined on the basis of Azerbaijan Scientific Research Institute of Cardiology. The patients were divided into 2 groups: 1st c. 60 males, mean age 54,8 ± 3,3 years, and 2nd gr 52 women, mean age 55,8 ± 3,1 years. To assess cardiac hemodynamic all patients underwent echocardiography (B-M-modes) using ‘Vivid 3’. Thus on the basis of indicators such as the index of the relative thickness of the left ventricle wall and the index of left ventricular mass (LVMI) was identified the architectonic model of the left ventricle. Results: According to our research leading cause of heart failure in women is 50.5% of cases of hypertension, ischemic heart disease 23.7% (with 79.5% of the cases developed in patients with chronic heart failure who did not have a history of myocardial infarction). While in men is the undisputed leader of CHD, forming 78.3% of CHF (80.3% in men with CHF occurred after myocardial infarction). According to our research in women more often than men CHF develops a type of diastolic dysfunction (DD, and left ventricular ejection fraction remained unchanged. Since DD occurs in men at 65,8% vs. 76,4% of women when p < 0,05. In the group of women was more common prognostic neblagopryatnye remodeling - eccentric hypertrophy of the left ventricle: 68% vs. 54.5% among men (p < 0,05), concentric left ventricular hypertrophy: 21% in women vs 19,1% (p > 0,05 ). Conclusions: Patients with heart failure are a number of gender-specific: the prevalence of hypertension in women, and coronary heart disease in men. While in women with heart failure often recorded diastolic dysfunction and characterized by the development of prognostically unfavorable remodeling types: eccentric and concentric LV hypertrophy.

Keywords: chronic heart failure, arterial hypertension, remodeling, diastolic dysfunction, men, women, ischemic heart disease

Procedia PDF Downloads 318
2480 Impact of Neuron with Two Dendrites in Heart Behavior

Authors: Kaouther Selmi, Alaeddine Sridi, Mohamed Bouallegue, Kais Bouallegue

Abstract:

Neurons are the fundamental units of the brain and the nervous system. The variable structure model of neurons consists of a system of differential equations with various parameters. By optimizing these parameters, we can create a unique model that describes the dynamic behavior of a single neuron. We introduce a neural network based on neurons with multiple dendrites employing an activation function with a variable structure. In this paper, we present a model for heart behavior. Finally, we showcase our successful simulation of the heart's ECG diagram using our Variable Structure Neuron Model (VSMN). This result could provide valuable insights into cardiology.

Keywords: neural networks, neuron, dendrites, heart behavior, ECG

Procedia PDF Downloads 54
2479 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 135
2478 Prediction of Coronary Heart Disease Using Fuzzy Logic

Authors: Elda Maraj, Shkelqim Kuka

Abstract:

Coronary heart disease causes many deaths in the world. Unfortunately, this problem will continue to increase in the future. In this paper, a fuzzy logic model to predict coronary heart disease is presented. This model has been developed with seven input variables and one output variable that was implemented for 30 patients in Albania. Here fuzzy logic toolbox of MATLAB is used. Fuzzy model inputs are considered as cholesterol, blood pressure, physical activity, age, BMI, smoking, and diabetes, whereas the output is the disease classification. The fuzzy sets and membership functions are chosen in an appropriate manner. Centroid method is used for defuzzification. The database is taken from University Hospital Center "Mother Teresa" in Tirana, Albania.

Keywords: coronary heart disease, fuzzy logic toolbox, membership function, prediction model

Procedia PDF Downloads 122