Search results for: Acute heart attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2567

Search results for: Acute heart attacks

2387 Calculation the Left Ventricle Wall Radial Strain and Radial SR Using Tagged Magnetic Resonance Imaging Data (tMRI)

Authors: Mohammed Alenezy

Abstract:

The function of cardiac motion can be used as an indicator of the heart abnormality by evaluating longitudinal, circumferential, and Radial Strain of the left ventricle. In this paper, the Radial Strain and SR is studied using tagged MRI (tMRI) data during the cardiac cycle on the mid-ventricle level of the left ventricle. Materials and methods: The short-axis view of the left ventricle of five healthy human (three males and two females) and four healthy male rats were imaged using tagged magnetic resonance imaging (tMRI) technique covering the whole cardiac cycle on the mid-ventricle level. Images were processed using Image J software to calculate the left ventricle wall Radial Strain and radial SR. The left ventricle Radial Strain and radial SR were calculated at the mid-ventricular level during the cardiac cycle. The peak Radial Strain for the human and rat heart was 40.7±1.44, and 46.8±0.68 respectively, and it occurs at 40% of the cardiac cycle for both human and rat heart. The peak diastolic and systolic radial SR for human heart was -1.78 s-1 ± 0.02 s-1 and 1.10±0.08 s-1 respectively, while for rat heart it was -5.16± 0.23s-1 and 4.25±0.02 s-1 respectively. Conclusion: This results show the ability of the tMRI data to characterize the cardiac motion during the cardiac cycle including diastolic and systolic phases which can be used as an indicator of the cardiac dysfunction by estimating the left ventricle Radial Strain and radial SR at different locations of the cardiac tissue. This study approves the validity of the tagged MRI data to describe accurately the cardiac radial motion.

Keywords: left ventricle, radial strain, tagged MRI, cardiac cycle

Procedia PDF Downloads 458
2386 A Rare Case of Endometriosis Lesion in Caecum Causing Acute Small Bowel Obstruction

Authors: Freda Halim

Abstract:

Endometriosis in bowel is rare condition, about 3-37% of endometriosis cases. Most of bowel endometriosis rising in the rectosigmoid (90% of bowel endometriosis). The incidence of caecal endometriosis is very low ( < 5% of bowel endometriosis) and almost never causing acute small bowel obstruction. The aim of this paper is to show that although bowel obstruction caused by caecal endometriosis is difficult to diagnose as it is rare, and may require laparotomy to make definite diagnosis, but it should be considered in infertile female patient. The case is 37 years old woman infertile woman with intestinal obstruction with pre-operative diagnosis total acute small bowel obstruction caused by right colonic mass, with sepsis as the complication. Before the acute small bowel obstruction, she complained of chronic right lower quadrant pain with chronic constipation alternate with chronic diarrhea, symptoms that happened both in bowel endometriosis and colorectal malignancy. She also complained of chronic pelvic pain and dysmenorrhea. She was married for 10 years with no child. The patient was never diagnosed with endometriosis and never seek medical attention for infertility and the chronic pelvic pain. The patient underwent Abdominal CT Scan, with results: massive small bowel obstruction, and caecal mass that causing acute small bowel obstruction. Diagnosis of acute small bowel obstruction due to right colonic mass was made, and exploratory laparotomy was performed in the patient. During the laparotomy, mass at caecum and ileocaecal that causing massive small bowel obstruction was found and standard right hemicolectomy and temporary ileostomy were performed. The pathology examination showed ectopic endometriosis lesions in caecum and ileocaecal valve. The histopathology also confirmed with the immunohistochemistry, in which positive ER, PR, CD 10 and CD7 was found the ileocaecal and caecal mass. In the second operation, reanastomosis of the ileum was done 3 months after the first operation. The chronic pelvic pain is decreasing dramatically after the first and second operation. In conclusion, although bowel obstruction caused by caecal endometriosis is a rare cause of intestinal obstruction, but it can be considered as a cause in infertile female patient

Keywords: acute, bowel obstruction, caecum, endometriosis

Procedia PDF Downloads 119
2385 CP-96345 Rregulates Hydrogen Sulphide Induced TLR4 Signaling Pathway Adhesion Molecules in Caerulein Treated Pancreatic Acinar Cells

Authors: Ramasamy Tamizhselvi, Leema George, Madhav Bhatia

Abstract:

We have earlier shown that mouse pancreatic acinar cells produce hydrogen sulfide (H2S) and play a role in the pathogenesis of acute pancreatitis. This study is to determine the effect of H2S on TLR4 mediated innate immune signaling in acute pancreatitis via substance P (SP). Male Swiss mice were treated with hourly intraperitoneal injection of caerulein (50μg/kg) for 10 hour. DL-propargylglycine (PAG) (100 mg/kg i.p.), an inhibitor of H2S formation was administered 1h after the induction of acute pancreatitis. Pancreatic acinar cells from male Swiss mice were incubated with or without caerulein (10–7 M for 60 min) and CP-96345 (NK1R inhibitor). To better understand the effect of H2S in inflammation, acinar cells were stimulated with caerulein after addition of H2S donor, NaHS. In addition, caerulein treated pancreatic acinar cells were pretreated with PAG (30 µM), for 1h. H2S inhibitor, PAG, eliminated TLR4, IRAK4, TRAF6 and NF-kB levels in an in vitro and in vivo model of caerulein-induced acute pancreatitis. PPTA gene deletion reduced TLR4, MyD88, IRAK4, TRAF6, adhesion molecules and NF-kB in caerulein treated pancreatic acinar cells whereas administration of NaHS resulted in further rise in TLR4 and NF-kB levels in caerulein treated pancreatic acinar cells. In addition, acini isolated from mice and treated with PPTA gene receptor NK1R antagonist CP96345 did not exhibit further increase in TLR4, IRAK4, TRAF6, adhesion molecules and NF-kB levels after NaHS pretreatment. The present findings show for the first time that in acute pancreatitis, H2S up-regulates TLR4 pathway and NF-kB via substance P.

Keywords: preprotachykinin-A gene, H2S, TLR4, acute pancreatitis

Procedia PDF Downloads 251
2384 Link Between Intensity-trajectories Of Acute Postoperative Pain And Risk Of Chronicization After Breast And Thoracopulmonary Surgery

Authors: Beloulou Mohamed Lamine, Fedili Benamar, Meliani Walid, Chaid Dalila

Abstract:

Introduction: The risk factors for the chronicization of postoperative pain are numerous and often intricately intertwined. Among these, the severity of acute postoperative pain is currently recognized as one of the most determining factors. Mastectomy and thoracotomy are described as among the most painful surgeries and the most likely to lead to chronic post-surgical pain (CPSP). Objective: To examine the aspects of acute postoperative pain potentially involved in the development of chronic pain following breast and thoracic surgery. Patients and Methods: A prospective study involving 164 patients was conducted over a six-month period. Postoperative pain (during mobilization) was assessed using a Visual Analog Scale (VAS) at various time points after surgery: Day 0, 1st, 2nd, 5th days, 1st and 6th months. Moderate to severe pain was defined as a VAS score ≥ 4. A comparative analysis (univariate analysis) of postoperative pain intensities at different evaluation phases was performed on patients with and without CPSP to identify potential associations with the risk of chronicization six months after surgery. Results: At the 6th month post-surgery, the incidence of CPSP was 43.0%. Moderate to severe acute postoperative pain (in the first five days) was observed in 64% of patients. The highest pain scores were reported among thoracic surgery patients. Comparative measures revealed a highly significant association between the presence of moderate to severe acute pain, especially lasting for ≥ 48 hours, and the occurrence of CPSP (p-value <0.0001). Likewise, the persistence of subacute pain (up to 4 to 6 weeks after surgery), especially of moderate to severe intensity, was significantly associated with the risk of chronicization at six months (p-value <0.0001). Conclusion: CPSP after breast and thoracic surgery remains a fairly common morbidity that profoundly affects the quality of life. Severe acute postoperative pain, especially if it is prolonged and/or with a slow decline in intensity, can be an important predictive factor for the risk of chronicization. Therefore, more effective and intensive management of acute postoperative pain, as well as longitudinal monitoring of its trajectory over time, should be an essential component of strategies for preventing chronic pain after surgery.

Keywords: chronic post-surgical pain, acute postoperative pain, breast and thoracic surgery, subacute postoperative pain, pain trajectory, predictive factor

Procedia PDF Downloads 36
2383 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking

Authors: Ersun N. Kurtulus

Abstract:

One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.

Keywords: terrorism, repression, radical left, mobilization of masses

Procedia PDF Downloads 187
2382 Pupils´ Questions at School Attendance Beginning and Teachers´ Teaching Strategy

Authors: Marie Pavelková, Hana Lukášová

Abstract:

Pupils´ inquisitiveness at the beginning of their school attendance is reflected by characteristics of the questions they ask. Clearly most of the classroom communication sequences are initiated by the teacher. But the teaching process also includes questions initiated by pupils in the need to satisfy their need for knowledge. The purpose of our research is to present the results of our pre-research strategy of occurrence of pupil-initiated questions in math lessons at the lower elementary school level, and to reveal the extent to which they are influenced by the teacher´s teaching strategy. We used the research methods of direct and indirect observations of fifth year classes in primary school. We focused on questions asked by the pupils in their math lessons. Our research sample for the pre-research observation method was a collection of video recordings available online. We used them for analysing the nature of pupils´ questions identified there. On the basis of the analysis, we hereby present the results concerning the nature of pupils´ questions asked in math lessons on the lower elementary school level. The interpretation of the collected results will be the starting point for the selection of research strategies in the next research stages concerning pupils’ questions in the future.

Keywords: beginning of schooling, pre-research, questions of pupils, teaching strategy

Procedia PDF Downloads 342
2381 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 123
2380 Swahili Codification of Emotions: A Cognitive Linguistic Analysis

Authors: Rosanna Tramutoli

Abstract:

Studies on several languages have demonstrated how different emotions are categorized in various linguistic constructions. It exists in several writings on the codification of emotions in Western African languages. A recent study on the semantic description of Swahili body terminology has demonstrated that body part terms, such as moyo (heart), uso (face) and jicho (eye) are involved in several metaphorical expressions describing emotions. However, so far hardly anything has been written on the linguistic description of emotions in Swahili. Thus, this study describes how emotional concepts, such as ‘love’ and ‘anger’ are codified in Swahili, in order to highlight common semantic and syntactic patterns, etymological sources and metaphorical expressions. The research seeks to answer a number of questions, such as which are the Swahili terms for ‘emotions’? Is there a distinction between ‘emotions’ and ‘feelings’? Which emotional lexical items have Bantu origin and which come from Arabic? Which metaphorical expressions/cognitive schemas are used to codify emotions? (e.g. kumpanda mtu kichwani, lit. ‘to climb on somebody’s head’, to make somebody feel angry, kushuka moyo, lit. ‘to be down the heart’, to feel discouraged, kumpa mtu moyo lit. ‘to give someone heart’, to encourage someone). Which body terms are involved as ‘containers/locus of emotions’? For instance, it has been shown that moyo (‘heart’) occurs as container of ‘love’ (e.g. kumtia mtu moyoni, lit. ‘to put somebody in the heart’, to love somebody very much) and ‘kindness’ (moyo wake ulijaa hisani, ‘his heart was filled with kindness’). The study also takes into account the syntactic patterns used to code emotions. For instance, when does the experiencer occur in subject position? (e.g. nina furaha, nimefurahi, ‘I am happy’) and when in object position (e.g. Huruma iliniingia moyoni, lit. ‘Pity entered me inside my heart’, ‘I felt pity’)? Data have been collected mostly through the analysis of Swahili digital corpora, containing different kinds of Swahili texts (e.g. novels, drama, political essays).

Keywords: emotions, cognitive linguistics, metaphors, Swahili

Procedia PDF Downloads 542
2379 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 352
2378 Bilateral Simultaneous Acute Primary Angle Closure Glaucoma: A Remarkable Case

Authors: Nita Nurlaila Kadarwaty

Abstract:

Purpose: This study presents a rare case of bilateral Acute Primary Angle Closure Glaucoma (PACG). Method: A case report of a 64-year-old woman with a good outcome Acute PACG in both eyes who underwent phacotrabeculectomy surgery. Result: A 64-year-old woman complained of acute pain in both eyes, accompanied by decreased vision, photophobia, and seeing halos for three weeks. There was no history of trauma, steroid or other systemic drugs used, or intraocular surgery before. Ophthalmologic examination revealed a right eye (RE) visual acuity of 0.1, left eye (LE) 0.2. RE intraocular pressure (IOP) was 12 mmhg and LE: 36.4 mmHg in medication of timolol maleat ED and acetazolamide oral. Both eyes' anterior segments revealed mixed injection, corneal edema, shallow anterior chamber, posterior synechiae, mid-dilatation pupil with negative pupillary reflection, and cloudy lens without intumescent. There was a glaucomatous optic and closed iridocorneal angle on the gonioscopy. Initial treatments included oral acetazolamide and potassium aspartate 250 mg three times a day, timolol maleate ED 0.5% twice a day, and prednisolone acetate ED 1% four times a day. This patient underwent trabeculectomy, phacoemulsification, and implantation of IOL in both eyes. One week after the surgeries, both eyes showed decreased IOP and good visual improvement. Conclusion: Bilateral simultaneous Acute PACG is generally severe and results in a poor outcome. It causes rapidly progressive visual loss and is often irreversible. Phacotrabeculectomy has more benefits compared to only phacoemulsification for the intervention regarding the reduced IOP post-surgical.

Keywords: acute primary angle closure glaucoma, intraocular pressure, phacotrabeculectomy, glaucoma

Procedia PDF Downloads 46
2377 Powering Pacemakers from Heart Pressure Variation with Piezoelectric Energy Harvesters

Authors: A. Mathieu, B. Aubry, E. Chhim, M. Jobe, M. Arnaud

Abstract:

Present project consists in a study and a development of piezoelectric devices for supplying power to new generation pacemakers. They are miniaturized leadless implants without battery placed directly in right ventricle. Amongst different acceptable energy sources in cardiac environment, we choose the solution of a device based on conversion of the energy produced by pressure variation inside the heart into electrical energy. The proposed energy harvesters can meet the power requirements of pacemakers, and can be a good solution to solve the problem of regular surgical operation. With further development, proposed device should provide enough energy to allow pacemakers autonomy, and could be good candidate for next pacemaker generation.

Keywords: energy harvester, heart, leadless pacemaker, piezoelectric cells, pressure variation

Procedia PDF Downloads 422
2376 Comparision of Neospora caninum Experimental Infection in Pigeons and Chickens Embryonated Eggs

Authors: S. Bahrami, A. Rezaie, Z. Boroumand, S. Ghavami

Abstract:

Neospora caninum is protozoan parasite which can cause a serious disease in dogs and cattle. It has been shown that birds may be a permissive intermediate host for N. caninum since parasite DNA has been detected in tissues from birds. It is showed that embryonated chicken egg can be used as an animal model for experimental infection. The aim of present study was to compare experimental infection of Neospora in chicken and pigeons embryonated eggs. An infection with N. caninum Nc1 isolate was conducted in chicken and pigeons embryonated eggs to evaluate LD50. After calculation of LD50, 2LD50 of tachyzoites were injected to eggs. Macroscopic changes of each embryo were noticed and to investigate the parasite distribution in tissues immunohistochemistry (IHC) and molecular methods were used. In the present study, histopathological changes were considered and sections to those used for histopathological examination including heart, liver, brain and chorioallantoic (CA) membrane were subjected to IHC, too. For PCR procedure, primer pair Np21/Np6 was used for amplification of the Nc5 gene. Pigeon's embryo showed more macroscopic changes than chicken embryo. A hemorrhage of the CA was the main grass lesion. All the infected tissues had histopathological changes. Microscopic examination of tissues revealed acute neosporosis due to hemorrhage, necrosis and infiltration of mononuclear inflammatory cells. Based on IHC and molecular results, the parasite aggregation in the heart was more predominant than in the other tissues. These results reinforce that there is genetic susceptibility to N. caninum in pigeons embryonated eggs like chickens embryonated eggs and provide new insights to research an inexpensive and available animal model for N. caninum.

Keywords: immunohistochemistry, Neospora caninum, PCR, pigeon embryonated egg

Procedia PDF Downloads 317
2375 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 320
2374 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 324
2373 Serum Potassium Before, During and After Exercise at 70% Maximal Heart Rate: The Safe Exercise Dosage Across Different Parameters of Health and Fitness Level

Authors: Omar bin Mihat

Abstract:

The number of sudden deaths is increasing over the past years. These deaths occur not during physical activities but upon cessation. Post-mortem confirms these deaths as cardiac arrest non-specifically. Congenital heart disease is a condition undiagnosed whereby only surface upon physical exertion leading to sudden death is unavoidable. Channelopathy, a condition that refers to any disease from the defect in iron-channel function, particularly the sodium-potassium pump, during the cessation of the exercise can be controlled. The derivation of heart rate return (HRrtn) is a procedure of a control cooling down process according to the heart rate (HR). Empirically, potassium rises linearly with intensity and falls sharply upon abrupt cessation of exertion, resulting in fatal arrhythmia due to hypokalaemia. It is vital that the flux of potassium should be maintained within the normal range during physical activities. To achieve this, the dosage of physical exertion (exercise) should be identified. Various percentages of the intensity of maximum heart rate (MHR) will precipitate different adaptations and remodeling of various organs. 70% of MHR will surface physiological adaptations, including enhancement of endurance, fitness level, and general health, and there was no significant rise of serum potassium (K+) during the entire phase of the treadmill brisk walk at a different rate of perceived exertion (RPE) from the subject of various fitness background. There was also no significant rise in blood pressure (BP) during the entire phase of the treadmill brisk walk, substantiating 70% MHR is the safe dosage across different parameters of health and fitness level.

Keywords: potassium, maximal heart rate, exercise dosage, fitness level

Procedia PDF Downloads 34
2372 Copy Number Variants in Children with Non-Syndromic Congenital Heart Diseases from Mexico

Authors: Maria Lopez-Ibarra, Ana Velazquez-Wong, Lucelli Yañez-Gutierrez, Maria Araujo-Solis, Fabio Salamanca-Gomez, Alfonso Mendez-Tenorio, Haydeé Rosas-Vargas

Abstract:

Congenital heart diseases (CHD) are the most common congenital abnormalities. These conditions can occur as both an element of distinct chromosomal malformation syndromes or as non-syndromic forms. Their etiology is not fully understood. Genetic variants such copy number variants have been associated with CHD. The aim of our study was to analyze these genomic variants in peripheral blood from Mexican children diagnosed with non-syndromic CHD. We included 16 children with atrial and ventricular septal defects and 5 healthy subjects without heart malformations as controls. To exclude the most common heart disease-associated syndrome alteration, we performed a fluorescence in situ hybridization test to identify the 22q11.2, responsible for congenital heart abnormalities associated with Di-George Syndrome. Then, a microarray based comparative genomic hybridization was used to identify global copy number variants. The identification of copy number variants resulted from the comparison and analysis between our results and data from main genetic variation databases. We identified copy number variants gain in three chromosomes regions from pediatric patients, 4q13.2 (31.25%), 9q34.3 (25%) and 20q13.33 (50%), where several genes associated with cellular, biosynthetic, and metabolic processes are located, UGT2B15, UGT2B17, SNAPC4, SDCCAG3, PMPCA, INPP6E, C9orf163, NOTCH1, C20orf166, and SLCO4A1. In addition, after a hierarchical cluster analysis based on the fluorescence intensity ratios from the comparative genomic hybridization, two congenital heart disease groups were generated corresponding to children with atrial or ventricular septal defects. Further analysis with a larger sample size is needed to corroborate these copy number variants as possible biomarkers to differentiate between heart abnormalities. Interestingly, the 20q13.33 gain was present in 50% of children with these CHD which could suggest that alterations in both coding and non-coding elements within this chromosomal region may play an important role in distinct heart conditions.

Keywords: aCGH, bioinformatics, congenital heart diseases, copy number variants, fluorescence in situ hybridization

Procedia PDF Downloads 259
2371 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 138
2370 Prediction of Survival Rate after Gastrointestinal Surgery Based on The New Japanese Association for Acute Medicine (JAAM Score) With Neural Network Classification Method

Authors: Ayu Nabila Kusuma Pradana, Aprinaldi Jasa Mantau, Tomohiko Akahoshi

Abstract:

The incidence of Disseminated intravascular coagulation (DIC) following gastrointestinal surgery has a poor prognosis. Therefore, it is important to determine the factors that can predict the prognosis of DIC. This study will investigate the factors that may influence the outcome of DIC in patients after gastrointestinal surgery. Eighty-one patients were admitted to the intensive care unit after gastrointestinal surgery in Kyushu University Hospital from 2003 to 2021. Acute DIC scores were estimated using the new Japanese Association for Acute Medicine (JAAM) score from before and after surgery from day 1, day 3, and day 7. Acute DIC scores will be compared with The Sequential Organ Failure Assessment (SOFA) score, platelet count, lactate level, and a variety of biochemical parameters. This study applied machine learning algorithms to predict the prognosis of DIC after gastrointestinal surgery. The results of this study are expected to be used as an indicator for evaluating patient prognosis so that it can increase life expectancy and reduce mortality from cases of DIC patients after gastrointestinal surgery.

Keywords: the survival rate, gastrointestinal surgery, JAAM score, neural network, machine learning, disseminated intravascular coagulation (DIC)

Procedia PDF Downloads 220
2369 Short-Term versus Long-Term Effect of Waterpipe Smoking Exposure on Cardiovascular Biomarkers in Mice

Authors: Abeer Rababa'h, Ragad Bsoul, Mohammad Alkhatatbeh, Karem Alzoubi

Abstract:

Introduction: Tobacco use is one of the main risk factors to cardiovascular diseases (CVD) and atherosclerosis in particular. WPS contains several toxic materials such as: nicotine, carcinogens, tar, carbon monoxide and heavy metals. Thus, WPS is considered to be as one of the toxic environmental factors that should be investigated intensively. Therefore, the aim of this study is to investigate the effect of WPS on several cardiovascular biological markers that may cause atherosclerosis in mice. The study also conducted to study the temporal effects of WPS on the atherosclerotic biomarkers upon short (2 weeks) and long-term (8 weeks) exposures. Methods: mice were exposed to WPS and heart homogenates were analyzed to elucidate the effects of WPS on matrix metalloproteinase (MMPs), endothelin-1 (ET-1) and, myeloperoxidase (MPO). Following protein estimation, enzyme-linked immunosorbent assays were done to measure the levels of MMPs (isoforms 1, 3, and 9), MPO, and ET-1 protein expressions. Results: our data showed that acute exposure to WPS significantly enhances the levels of MMP-3, MMP- 9, and MPO expressions (p < 0.05) compared to their corresponding control. However, the body was capable to normalize the level of expressions for such parameters following continuous exposure for 8 weeks (p > 0.05). Additionally, we showed that the level of ET-1 expression was significantly higher upon chronic exposure to WPS compared to both control and acute exposure groups (p < 0.05). Conclusion: Waterpipe exposure has a significant negative effect on atherosclerosis and the enhancement of the atherosclerotic biomarkers expression (MMP-3 and 9, MPO, and ET-1) might represent an early scavenger of compensatory efforts to maintain cardiac function after WP exposure.

Keywords: atherosclerotic biomarkers, cardiovascular disease, matrix metalloproteinase, waterpipe

Procedia PDF Downloads 323
2368 The Intensity of Load Experienced by Female Basketball Players during Competitive Games

Authors: Tomas Vencurik, Jiri Nykodym

Abstract:

This study compares the intensity of game load among player positions and between the 1st and the 2nd half of the games. Two guards, three forwards, and three centers (female basketball players) participated in this study. The heart rate (HR) and its development were monitored during two competitive games. Statistically insignificant differences in the intensity of game load were recorded between guards, forwards, and centers below and above 85% of the maximal heart rate (HRmax) and in the mean HR as % of HRmax (87.81±3.79%, 87.02±4.37%, and 88.76±3.54%, respectively). Moreover, when the 1st and the 2nd half of the games were compared in the mean HR (87.89±4.18% vs. 88.14±3.63% of HRmax), no statistical significance was recorded. This information can be useful for coaching staff, to manage and to precisely plan the training process.

Keywords: game load, heart rate, player positions, the 1st, the 2nd half of the games

Procedia PDF Downloads 539
2367 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 54
2366 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 613
2365 Impacts of Opium Addiction on Patterns of Angiographic Findings in Patients with Coronary Artery Syndrome

Authors: Alireza Abdiardekani, Maryam Salimi, Shirin Sarejloo, Mehdi Bazrafshan, Amir Askarinejad, Amirhossein Salimi, Hanieh Bazrafshan, Salar Javanshir, Armin Attar, Shokoufeh Khanzadeh, Mohsen Esmaeili, Hamed Bazrafshan Drissi

Abstract:

Background: Opium, after tobacco, is the most abused substance in the Middle East. The effects of opium use on coronary artery disease are indeed unclear. This study aimed to assess the association between opium use and angiographic findings in patients with acute coronary syndrome (ACS) diagnosis at Al-Zahra Heart Hospital, Shiraz, Iran. Methods: In this case-control study, 170 patients admitted for coronary angiography were enrolled from 2019 to 2020. They were categorized into two groups based on their history: "non-opium" and "opium." SPSS (Version 26) was used to investigate the correlation between opioid addiction and the severity of coronary artery disease. Results: The results of our study reveal that the mean age of the participants was 61.63±9.07. This study indicated that 49 (28.82%) patients were female, and 121 (71.17%) were male. Our findings revealed that three-vessel disease was more frequent in non-opium (40; 47.05%) and opium (45; 52.94%) groups. There was a significant correlation between the severity of the second diagonal artery(D2) and right coronary artery(RCA) involvement and opium consumption. There was a strong positive correlation between the location of the vascular lesion in the left circumflex artery and opium consumption. Conclusion: Opium, as an independent risk factor for cardiovascular diseases, can have specific effects on angiographic findings in patients with coronary artery disease. Public health officials and politicians should arrange several programs to increase the general population’s consciousness about opioid use and its consequences.

Keywords: acute coronary syndrome, opium, coronary artery disease, angiography

Procedia PDF Downloads 102
2364 Clinical Features of Acute Aortic Dissection Patients Initially Diagnosed with ST-Segment Elevation Myocardial Infarction

Authors: Min Jee Lee, Young Sun Park, Shin Ahn, Chang Hwan Sohn, Dong Woo Seo, Jae Ho Lee, Yoon Seon Lee, Kyung Soo Lim, Won Young Kim

Abstract:

Background: Acute myocardial infarction (AMI) concomitant with acute aortic syndrome (AAS) is rare but prompt recognition of concomitant AAS is crucial, especially in patients with ST-segment elevation myocardial infarction (STEMI) because misdiagnosis with early thrombolytic or anticoagulant treatment may result in catastrophic consequences. Objectives: This study investigated the clinical features of patients of STEMI concomitant with AAS that may lead to the diagnostic clue. Method: Between 1 January 2010 and 31 December 2014, 22 patients who were the initial diagnosis of acute coronary syndrome (AMI and unstable angina) and AAS (aortic dissection, intramural hematoma and ruptured thoracic aneurysm) in our emergency department were reviewed. Among these, we excluded 10 patients who were transferred from other hospital and 4 patients with non-STEMI, leaving a total of 8 patients of STEMI concomitant with AAS for analysis. Result: The mean age of study patients was 57.5±16.31 years and five patients were Standford type A and three patients were type B aortic dissection. Six patients had ST-segment elevation in anterior leads and two patients had in inferior leads. Most of the patients had acute onset, severe chest pain but no patients had dissecting nature chest pain. Serum troponin I was elevated in three patients but all patients had D-dimer elevation. Aortic regurgitation or regional wall motion abnormality was founded in four patients. However, widened mediastinum was seen in all study patients. Conclusion: When patients with STEMI have elevated D-dimer and widened mediastinum, concomitant AAS may have to be suspected.

Keywords: aortic dissection, myocardial infarction, ST-segment, d-dimer

Procedia PDF Downloads 370
2363 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 315
2362 A Psychoanalytical Approach to Edgar A. Poe’s Short Story ‘The Tell-Tale Heart’

Authors: José Antonio Núñez

Abstract:

Sigmund Freud’s Theory of Psychoanalysis was a groundbreaking contribution to the province of the human psyche and behavior. Nowadays, psychoanalytic theory is applied to numerous fields. One of them is literature. Literary criticism has put into practice the basis of Freud’s idea to analyze literary works. This essay is about the analysis of Edgar A. Poe’s short story ‘The Tell-Tale Heart,’ under the lens of Freud’s psychoanalytical perspective. In 1919, it was published ‘Das Unheimliche’ (The Uncanny) by Freud. On this article, the famous Austrian psychoanalyst showed his explanations about what he called ‘the uncanny,’ and its relation to the human unconscious. In this paper, Freud’s famous article has been used to analyze Poe’s short story ‘The Tell-Tale Heart,’ and to find the analogies that exist between Poe’s macabre short story and Freud’s theory of ‘the uncanny.’

Keywords: psychoanalysis, theory of the unconscious, the uncanny, unheimlich

Procedia PDF Downloads 555
2361 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 428
2360 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security

Authors: Yael Deutsch, Arieh Gavious

Abstract:

The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.

Keywords: game theory, profiling, security, nash equilibrium

Procedia PDF Downloads 79
2359 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 455
2358 Acute Phase Proteins as Biomarkers of Urinary Tract Infection (UTI) in Dairy Cattle

Authors: Wael El-Deeb

Abstract:

The present study aimed to investigate the diagnostic importance of acute phase proteins in urinary tract infection (UTI) in cattle. We describe the clinical, bacteriological and biochemical findings in 99 lactating cows. Blood and urine samples from diseased (n=84) and control healthy cows (n=15) were submitted to laboratory investigations. The urine analysis revealed hematuria and pyuria in UTI group. The isolated bacteria were E.coli (43/84) Corynebacterium spp, (31/84), Proteus spp. (6/84) and Streptococcus spp (4/84). The concentrations of Haptoglobin (Hp), serum amyloid A (SAA), α1-Acid glycoprotein (AGP), fibrinogen (Fb), total protein, albumen, and globulin were higher in cows with UTI when compared to healthy ones. Fifty-one of 84 cows with UTI were successfully treated. The levels of Hp, SAA, AGP, total protein, and globulin were associated with the odds of treatment failure. Conclusively, acute phase proteins could be used as diagnostic and prognostic biomarkers in cows with UTI.

Keywords: cows, urinary, infections, haptoglobin, serum Amyloid A

Procedia PDF Downloads 696