Search results for: Kristina Hellman
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 63

Search results for: Kristina Hellman

63 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 291
62 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 61
61 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 419
60 Uterine Cervical Cancer; Early Treatment Assessment with T2- And Diffusion-Weighted MRI

Authors: Susanne Fridsten, Kristina Hellman, Anders Sundin, Lennart Blomqvist

Abstract:

Background: Patients diagnosed with locally advanced cervical carcinoma are treated with definitive concomitant chemo-radiotherapy. Treatment failure occurs in 30-50% of patients with very poor prognoses. The treatment is standardized with risk for both over-and undertreatment. Consequently, there is a great need for biomarkers able to predict therapy outcomes to allow for individualized treatment. Aim: To explore the role of T2- and diffusion-weighted magnetic resonance imaging (MRI) for early prediction of therapy outcome and the optimal time point for assessment. Methods: A pilot study including 15 patients with cervical carcinoma stage IIB-IIIB (FIGO 2009) undergoing definitive chemoradiotherapy. All patients underwent MRI four times, at baseline, 3 weeks, 5 weeks, and 12 weeks after treatment started. Tumour size, size change (∆size), visibility on diffusion-weighted imaging (DWI), apparent diffusion coefficient (ADC) and change of ADC (∆ADC) at the different time points were recorded. Results: 7/15 patients relapsed during the study period, referred to as "poor prognosis", PP, and the remaining eight patients are referred to "good prognosis", GP. The tumor size was larger at all time points for PP than for GP. The ∆size between any of the four-time points was the same for PP and GP patients. The sensitivity and specificity to predict prognostic group depending on a remaining tumor on DWI were highest at 5 weeks and 83% (5/6) and 63% (5/8), respectively. The combination of tumor size at baseline and remaining tumor on DWI at 5 weeks in ROC analysis reached an area under the curve (AUC) of 0.83. After 12 weeks, no remaining tumor was seen on DWI among patients with GP, as opposed to 2/7 PP patients. Adding ADC to the tumor size measurements did not improve the predictive value at any time point. Conclusion: A large tumor at baseline MRI combined with a remaining tumor on DWI at 5 weeks predicted a poor prognosis.

Keywords: chemoradiotherapy, diffusion-weighted imaging, magnetic resonance imaging, uterine cervical carcinoma

Procedia PDF Downloads 110
59 Key Transfer Protocol Based on Non-invertible Numbers

Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez

Abstract:

We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.

Keywords: invertible, non-invertible, ring, key transfer

Procedia PDF Downloads 132
58 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro

Authors: Safwan Mawlood Hussien

Abstract:

Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.

Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro

Procedia PDF Downloads 90
57 The Permutation of Symmetric Triangular Equilateral Group in the Cryptography of Private and Public Key

Authors: Fola John Adeyeye

Abstract:

In this paper, we propose a cryptosystem private and public key base on symmetric group Pn and validates its theoretical formulation. This proposed system benefits from the algebraic properties of Pn such as noncommutative high logical, computational speed and high flexibility in selecting key which makes the discrete permutation multiplier logic (DPML) resist to attack by any algorithm such as Pohlig-Hellman. One of the advantages of this scheme is that it explore all the possible triangular symmetries. Against these properties, the only disadvantage is that the law of permutation multiplicity only allow an operation from left to right. Many other cryptosystems can be transformed into their symmetric group.

Keywords: cryptosystem, private and public key, DPML, symmetric group Pn

Procedia PDF Downloads 166
56 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 377
55 Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce

Authors: Wenjie Qin, Kewei Lv

Abstract:

In 1996, Boneh and Venkatesan proposed the Hidden Number Problem (HNP) and proved the most significant bits (MSB) of computational Diffie-Hellman key exchange scheme and related schemes are unpredictable bits. They also gave a method which is a lattice rounding technique to solve HNP in non-uniform model. In this paper, we put forward a new concept that is Schnorr-MSB-HNP. We also reduce the problem of solving Schnorr signature private key with a few consecutive most significant bits of random nonce (used at each signature generation) to Schnorr-MSB-HNP, then we use the rounding technique to solve the Schnorr-MSB-HNP. We have come to the conclusion that if there is a ‘miraculous box’ which inputs the random nonce and outputs 2loglogq (q is a prime number) most significant bits of nonce, the signature private key will be obtained by choosing 2logq signature messages randomly. Thus we get an attack on the Schnorr signature private key.

Keywords: rounding technique, most significant bits, Schnorr signature algorithm, nonce, Schnorr-MSB-HNP

Procedia PDF Downloads 197
54 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 273
53 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field

Procedia PDF Downloads 196
52 Comparative Analysis of Real and Virtual Garment Fit

Authors: Kristina Ancutiene

Abstract:

The goal of this research is to perform comparative analysis between the virtual fit of the woman's dress and the fit on a real person. The dress fitting was done using mechanical and structural parameters of the 100 % linen fabric and using Modaris_3D_Fit software (CAD Lectra). The dress was also sawn after which garment fit differences of real and virtual dress was researched. Four respondents whose figures were similar were used to evaluate the ease and strain deformations of the real and virtual dress. The scores that were given by the respondents wearing the real dress were compared to the ease and strain results that were given by the software. The main result was that respondents feel similar to the virtual stretch deformations but their ease feeling is not always matching the virtual ones. The results may be influenced by psychological factors and different understanding about purpose of garment.

Keywords: virtual garment, 3D CAD, garment fit, mechanical properties

Procedia PDF Downloads 294
51 Use of Adjunctive Cannabinoids in Opioid Dosing for Patients with Chronic Pain

Authors: Kristina De Milt, Nicole Huang, Jihye Park

Abstract:

Opioids have been a mainstay of the treatment of chronic pain, but their overprescription and misuse have led to an opioid epidemic. Recently, as an attempt to decrease the number of opioids prescribed, the use of cannabinoid therapy has become an increasingly popular adjunctive chronic pain management choice among providers. This review of literature investigates the effects of adjunctive cannabinoids to opioids in the management of chronic pain. The nine articles are included in the literature review range from observational studies to meta-analyses published in the year 2016 and after. A majority of the studies showed a decrease in the need for opioids after adjunctive cannabinoids were introduced and, in some instances, the cessation of opioid consumption. More high-quality evidence is needed to further support this stance and providers should weigh the benefits and risks of adjunctive cannabinoids according to the clinical picture.

Keywords: cannabis, chronic pain, opioids, pain management

Procedia PDF Downloads 216
50 An Analysis of Non-Elliptic Curve Based Primality Tests

Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li

Abstract:

Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.

Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test

Procedia PDF Downloads 48
49 Sustainable Building Design for Energy Efficiency and Healthier Electromagnetic Environment

Authors: Riadh Habash, Kristina Djukic, Gandhi Habash

Abstract:

Sustainable design is one of the emerging milestones in building construction. This concept is defined as buildings that on a yearly average consume as much energy as they generate using renewable energy sources. Realization of sustainable buildings requires a wide range of technologies, systems and solutions with varying degrees of complexity and sophistication, depending upon the location and surrounding environmental conditions. This paper will address not only the role of the above technologies and solutions but will provide solutions to reduce the electromagnetic fields (EMFs) in the building as much as possible so that the occupiers can recover from electro-hyper-sensitivity, if any. The objective is to maximize energy efficiency, optimize occupant comfort, reduce dependency on the grid and provide safer and healthier EMF environment especially for hypersensitive people. Creative architectural and engineering solutions that capitalize on the design of energy efficient technologies; combined cooling, heating and power (CCHP) microgrid (MG); and EMF mitigation will be presented.

Keywords: sustainable buildings, energy efficiency, thermal simulation, electromagnetic environment

Procedia PDF Downloads 273
48 Direct Growth Rates of the Information Model for Traffic at the Service of Sustainable Development of Tourism in Dubrovacko-Neretvanska County 2014-2020

Authors: Vinko Viducic, Jelena Žanic Mikulicic, Maja Racic, Kristina Sladojevic

Abstract:

The research presented in this paper has been focused on analyzing the impact of traffic on the sustainable development of tourism in Croatia's Dubrovacko-Neretvanska County by the year 2020, based on the figures and trends reported in 2014 and using the relevant variables that characterise the synergy of traffic and tourism in, speaking from the geographic viewpoint, the most problematic county in the Republic of Croatia. The basic hypothesis has been confirmed through scientifically obtained research results, through the quantification of the model's variables and the direct growth rates of the designed model. On the basis of scientific insights into the sustainable development of traffic and tourism in Dubrovacko-Neretvanska County, it is possible to propose a new information model for traffic at the service of the sustainable development of tourism in the County for the period 2014-2020.

Keywords: environment protection, hotel industry, private sector, quantification

Procedia PDF Downloads 246
47 Investigation of Garment Fit Using Virtual Try-On Technology

Authors: Kristina Ancutiene, Agne Lage, Ada Gulbiniene

Abstract:

Virtual garment fitting has gotten considerable attention for researchers currently. Virtual try-on technologies provide the opportunity to check garment fit using various fabrics and sizes. Differences in fabric mechanical properties produce differences in garment fit. This research aimed to investigate the virtual garment fit concerning the fabric's mechanical properties by determining distance ease between the body and the garment. In this research, virtual women mannequin was covered with straight fit virtual dress stitched in Modaris 3D (CAD Lectra). Garment fitting was investigated using seven cotton/cotton blended plain weave fabrics. Ease allowance value at bust, waist and hip girths in 2D basic patterns was changed uniformly from 0 cm to 8 cm. The values of distance ease in 3D virtual garments at the three main girths were investigated. Distance ease distribution in the virtual garment was investigated also. It was defined that by increasing of 2D patterns ease allowance, 3D garment distance ease changes proportionally but differently using various fabrics. Correlation analysis between 3D garment ease and mechanical properties showed that tensile strain in weft direction had the strongest relation.

Keywords: 3D CAD, distance ease, fabric, garment fit, virtual try-on

Procedia PDF Downloads 130
46 Band Gap Tuning Based on Adjustable Stiffness of Local ‎Resonators ‎

Authors: Hossein Alimohammadi, Kristina Vassiljeva, Hassan HosseinNia, Eduard Petlenkov

Abstract:

This research article discusses the mechanisms for bandgap tuning of beam-type resonators to achieve ‎broadband vibration suppression through adjustable stiffness. The method involves changing the center of ‎mass of the cantilever-type resonator to achieve piezo-free tuning of stiffness. The study investigates the ‎effect of the center of masses variation (δ) of attached masses on the bandgap and vibration suppression ‎performance of a non-uniform beam-type resonator within a phononic structure. The results suggest that the ‎cantilever-type resonator beam can be used to achieve tunability and real-time control and indicate that ‎varying δ significantly impacts the bandgap and transmittance response. Additionally, the research explores ‎the use of the first and second modes of resonators for tunability and real-time control. These findings examine ‎the feasibility of this approach, demonstrate the potential for improving resonator performance, and provide ‎insights into the design and optimization of metamaterial beams for vibration suppression applications.

Keywords: bandgap, adjustable stiffness, spatial variation, tunability

Procedia PDF Downloads 51
45 Food Security from a Spatial Perspective; The Situation in Advanced and Less Advanced Economies

Authors: Kristina Thorell

Abstract:

Food security has been one of the most important policy issues on the global arena after the Second World War. The overall aim of this presentation is to describe preconditions for a sustainable food supply from a spatial perspective. Special attention is paid to the differences between advanced and less advanced economies around the world. The theoretical framework is based upon models which are explaining complex systems of factors that affect the preconditions for agricultural productions. In additions to this, theories about how population and environmental pollution change through different stages of societal development are explained. The results are based upon data of agricultural practices, population growth, hunger and nutrition levels from different countries around the world. The analysis shows that factors which affect preconditions for agricultural production are dynamic. Factors which support the food security in the near future are a decreasing population growth, technological development and innovation but the environmental crisis is associated to high risks. It is, therefore, important to develop environmental policies and improved methods for organic farming. A final conclusion is that the spatial pattern is clear; the food supply is sufficient within advanced economies but rather complicated in development countries.

Keywords: food security, agricultural geography, demography, advanced economies, population growth, agricultural practices

Procedia PDF Downloads 277
44 Enjoyable Learning Experience, but also Difficult: Young, Unaccompanied Refugees' Perspectives on Participatory Research

Authors: Kristina Johansen

Abstract:

Participation is a universal right that all children and young people are entitled to, according to the Convention on the Rights of the Child. Social work and action research share participation as a core value. However, we have limited knowledge of how children and young people of refugee background experience taking part in participatory research. The point of departure of this presentation is a qualitative study involving young, unaccompanied refugees, addressing the issues of psychosocial health and participation. The research design included participatory methods and action research. The presentation highlights the perspectives of young, unaccompanied refugees on what made participating in the research process valuable, what created challenges for participation and what created challenges for the action part in the research process. Feedback from participants indicated that taking part in enjoyable experiences, being listened to, sharing experiences, and learning from each other contributed to making the participation valuable. At the same time, participants addressed challenges related to communication, sensitive topics, participation in decision-making and powerlessness. The presentation will end with implications for social work research and practice involving young refugees.

Keywords: participatory research, power, young unaccompanied refugeees, relationships, participation

Procedia PDF Downloads 49
43 Synthesis of Pyrimidine-Based Polymers Consist of 2-{3-[4,6-Bis-(4-Hexyl-Thiophen-2-yl)-Pyrimidin-2-yl]Phenyl}-Thiazolo[5,4-B]Pyridine as Electron-Deficient Unit for Photovoltaics

Authors: Hyehyeon Lee, Juwon Yu, Juwon Kim, Raquel Kristina Leoni Tumiar, Taewon Kim, Juae Kim, Hongsuk Suh

Abstract:

Recently, the development of photovoltaics is rapidly accelerating as one of green energy sources. So we designed pyrimidine-based polymers with 2-{3-[4,6-bis-(4-hexyl-thiophen-2-yl)-pyrimidin-2-yl]-phenyl}-thiazolo[5,4-b]pyridine (mPTP), as active layer substances for polymer solar cells. Polymers with push-pull types, mPTPBDT-12, mPTPBDT-EH, mPTPBDTT-EH and mPTPTTI, are comprised of electron pushing unit using benzo[1,2-b;3,4-b’]dithiophene (BDT) or 4,8-bis(5-thiophen-2-yl)benzo[1,2-b:4,5-b']dithiophene (BDTT) or 6-(2-thienyl)-4H-thieno[3,2-b]indole(TTI) and electron pulling unit using mPTP. The device including mPTPTTI-12 indicated a VOC of 0.67 V, a JSC of 2.16 mA/cm², and a fill factor (FF) of 0.30, giving a power conversion efficiency (PCE) of 0.43%. The device including mPTPBDT-EH indicated a VOC of 0.56 V, a JSC of 2.64 mA/cm², and an FF of 0.30, giving a PCE of 0.44%. The device including mPTPBDTT-EH indicated a VOC of 0.44 V, a JSC of 2.45 mA/cm², and an FF of 0.29, giving a PCE of 0.31%. The device including mPTPTTI indicated a VOC of 0.72 V, a JSC of 4.95 mA/cm², and an FF of 0.32, giving a PCE of 1.15%. Therefore, mPTPBDT-12, mPTPBDT-EH, mPTPBDTT-EH and mPTPTTI were fabricated by Stille polymerization. Their optical properties were measured and the results show that pyrimidine-based polymers have a great promise to act as donor of active layer.

Keywords: polymer solar cells, photovoltaics, thiazolopyridine, conjugated polymer

Procedia PDF Downloads 241
42 Speech and LanguageTherapists’ Advices for Multilingual Children with Developmental Language Disorders

Authors: Rudinë Fetahaj, Flaka Isufi, Kristina Hansson

Abstract:

While evidence shows that in most European countries’ multilingualism is rising, unfortunately, the focus of Speech and Language Therapy (SLT) is still monolingualism. Furthermore, there is sparse information on how the needs of multilingual children with language disorders such as Developmental Language Disorder (DLD) are being met and which factors affect the intervention approach of SLTs when treating DLD. This study aims to examine the relationship and correlation between the number of languages SLTs speak, years of experience, and length of education with the advice they give to parents of multilingual children with DLD regarding which language to be spoken. This is a cross-sectional study where a survey was completed online by 2608 SLTs across Europe and data has been used from a 2017 COST-action project. IBM-SPSS-28 was used where descriptive analysis, correlation and Kruskal-Wallis test were performed.SLTs mainly advise the parents of multilingual children with DLD to speak their native language at home. Besides years of experience, language status and the level of education showed to have no association with the type of advice SLTs give. Results showed a non-significant moderate positive correlation between SLTs years of experience and their advice regarding the native language, whereas language status and length of education showed no correlation with the advice SLTs give to parents.

Keywords: quantitative study, developmental language disorders, multilingualism, speech and language therapy, children, European context

Procedia PDF Downloads 53
41 Stimuli-Responsive Zwitterionic Dressings for Chronic Wounds Management

Authors: Konstans Ruseva, Kristina Ivanova, Katerina Todorova, Margarita Gabrashanska, Tzanko Tzanov, Elena Vassileva

Abstract:

Zwitterionic polymers (ZP) are well-known with their ultralow biofouling. They are successfully competing with poly(ethylene glycols) (PEG), which are considered as the “golden standard” in this respect. These unique properties are attributed to their strong hydration capacity, defined by the dipole-dipole interactions, arising between the ZP pendant groups as well as to the dipoles interaction with water molecules. Beside, ZP are highly resistant to bacterial adhesion thus ensuring an excellent anti-biofilm formation ability. Moreover, ZP are able to respond upon external stimuli such as temperature, pH, salt concentration changes which in combination with their anti-biofouling effect render this type of polymers as materials with a high potential in biomedical applications. The present work is focused on the development of zwitterionic hydrogels for efficient treatment of highly exudating and hard-to-heal chronic wounds. To this purpose, two types of ZP networks with different crosslinking degree were synthesized - polysulfobetaine (PSB) and polycarboxybetaine (PCB) ones. They were characterized in terms of their physico-mechanical properties, e.g. microhardness, swelling ability, smart behaviour. Furthermore, the potential of ZP networks to resist biofilm formation towards Staphylococcus aureus and Escherichia coli was studied. Their ability to reduce the high levels of myeloperoxidase and metalloproteinase, two enzymes that are part of the chronic wounds enviroenment, was revealed. Moreover, the in vitro cytotoxic assessment of PSB and PCB networks along with their in vivo performance in rats was also studied to reveal their high biocompatibility.

Keywords: absorption properties, biocompatibility, enzymatic inhibition activity, wound healing, zwitterionic polymers

Procedia PDF Downloads 161
40 Long Term Examination of the Profitability Estimation Focused on Benefits

Authors: Stephan Printz, Kristina Lahl, René Vossen, Sabina Jeschke

Abstract:

Strategic investment decisions are characterized by high innovation potential and long-term effects on the competitiveness of enterprises. Due to the uncertainty and risks involved in this complex decision making process, the need arises for well-structured support activities. A method that considers cost and the long-term added value is the cost-benefit effectiveness estimation. One of those methods is the “profitability estimation focused on benefits – PEFB”-method developed at the Institute of Management Cybernetics at RWTH Aachen University. The method copes with the challenges associated with strategic investment decisions by integrating long-term non-monetary aspects whilst also mapping the chronological sequence of an investment within the organization’s target system. Thus, this method is characterized as a holistic approach for the evaluation of costs and benefits of an investment. This participation-oriented method was applied to business environments in many workshops. The results of the workshops are a library of more than 96 cost aspects, as well as 122 benefit aspects. These aspects are preprocessed and comparatively analyzed with regards to their alignment to a series of risk levels. For the first time, an accumulation and a distribution of cost and benefit aspects regarding their impact and probability of occurrence are given. The results give evidence that the PEFB-method combines precise measures of financial accounting with the incorporation of benefits. Finally, the results constitute the basics for using information technology and data science for decision support when applying within the PEFB-method.

Keywords: cost-benefit analysis, multi-criteria decision, profitability estimation focused on benefits, risk and uncertainty analysis

Procedia PDF Downloads 410
39 PRKAG3 and RYR1 Gene in Latvian White Pigs

Authors: Daina Jonkus, Liga Paura, Tatjana Sjakste, Kristina Dokane

Abstract:

The aim of this study was to analyse PRKAG3 and RYR1 gene and genotypes frequencies in Latvian White pigs’ breed. Genotypes of RYR1 gene two loci (rs196953058 and rs323041392) in 89 exon and PRKAG3 gene two loci (rs196958025 and rs344045190) in gene promoter were detected in 103 individuals of Latvian white pigs’ breed. Analysis of RYR1 gene loci rs196953058 shows all individuals are homozygous by T allele and all animals are with genotypes TT, its mean - in 2769 position is Phenylalanine. Analysis of RYR1 gene loci rs323041392 shows all individuals are homozygous by G allele and all animals are with genotypes GG, its mean - in 4119 positions is Asparagine. In loci rs196953058 and rs323041392, there were no gene polymorphisms. All analysed individuals by two loci rs196953058-rs323041392 have TT-GG genotypes or Phe-Asp amino acids. In PRKAG3 gene loci rs196958025 and rs344045190 there was gene polymorphisms. In both loci frequencies for A allele was higher: 84.6% for rs196958025 and 73.0% for rs344045190. Analysis of PRKAG3 gene loci rs196958025 shows 74% of individuals are homozygous by An allele and animals are with genotypes AA. Only 4% of individuals are homozygous by G allele and animals are with genotypes GG, which is associated with pale meat colour and higher drip loss. Analysis of PRKAG3 gene loci rs344045190 shows 46% of individuals are homozygous with genotypes AA and 54% of individuals are heterozygous with genotypes AG. There are no individuals with GG genotypes. According to the results, in Latvian white pigs population there are no rs344435545 (RYR1 gene) CT heterozygous or TT recessive homozygous genotypes, which is related to the meat quality and pigs’ stress syndrome; and there are 4% rs196958025 (PRKAG3 gene) GG recessive homozygote genotypes, which is related to the meat quality. Acknowledgment: the investigation is supported by VPP 2014-2017 AgroBioRes Project No. 3 LIVESTOCK.

Keywords: genotype frequencies, pig, PRKAG3, RYR1

Procedia PDF Downloads 183
38 Preventive Interventions for Central Venous Catheter Infections in Intensive Care Units: A Systematic Literature Review

Authors: Jakob Renko, Deja Praprotnik, Kristina Martinovič, Igor Karnjuš

Abstract:

Introduction: Catheter-related bloodstream infections are a major burden for healthcare and patients. Although infections of this type cannot be completely avoided, they can be reduced by taking preventive measures. The aim of this study is to review and analyze the existing literature on preventive interventions to prevent central venous catheters (CVC) infections. Methods: A systematic literature review was carried out. The international databases CINAHL, Medline, PubMed, and Web of Science were searched using the search strategy: "catheter-related infections" AND "intensive care units" AND "prevention" AND "central venous catheter." Articles that met the inclusion and exclusion criteria were included in the study. The literature search flow is illustrated by the PRISMA diagram. The descriptive research method was used to analyze the data. Results: Out of 554 search results, 22 surveys were included in the final analysis. We identified seven relevant preventive measures to prevent CVC infections: washing the whole body with chlorhexidine gluconate (CHG) solution, disinfecting the CVC entry site with CHG solution, use of CHG or silver dressings, alcohol protective caps, CVC care education, selecting appropriate catheter and multicomponent care bundles. Discussion and conclusions: Both single interventions and multicomponent care bundles have been shown to be currently effective measures to prevent CVC infections in adult patients in the ICU. None of the measures identified stood out in terms of their effectiveness. Prevention work to reduce CVC infections in the ICU is a complex process that requires the simultaneous consideration of several factors.

Keywords: central venous access, critically ill patients, hospital-acquired complications, prevention

Procedia PDF Downloads 303
37 Synthesis of Pyrimidine-Based Polymers Consist of 2-{4-[4,6-Bis-(4-Hexyl-Thiophen-2-yl)-Pyrimidin-2-yl]-Phenyl}-Thiazolo[5,4-B]Pyridine with Deep HOMO Level for Photovoltaics

Authors: Hyehyeon Lee, Jiwon Yu, Juwon Kim, Raquel Kristina Leoni Tumiar, Taewon Kim, Juae Kim, Hongsuk Suh

Abstract:

Photovoltaics, which have many advantages in cost, easy processing, and light-weight, have attracted attention. We synthesized pyrimidine-based conjugated polymers with 2-{4-[4,6-bis-(4-hexyl-thiophen-2-yl)-pyrimidin-2-yl]-phenyl}-thiazolo[5,4-b]pyridine (pPTP) which have an ability of powerful electron withdrawing and introduced into the PSCs. By Stille polymerization, we designed the conjugated polymers, pPTPBDT-12, pPTPBDT-EH, pPTPBDTT-EH and pPTPTTI. The HOMO energy levels of four polymers (pPTPBDT-12, pPTPBDT-EH, pPTPBDTT-EH and pPTPTTI) were at -5.61 ~ -5.89 eV, their LUMO (Lowest Unoccupied Molecular Orbital) energy levels were at -3.95 ~ -4.09 eV. The device including pPTPBDT-12 and PC71BM (1:2) indicated a V_oc of 0.67 V, a J_sc of 1.33 mA/cm², and a fill factor (FF) of 0.25, giving a power conversion efficiency (PCE) of 0.23%. The device including pPTPBDT-EH and PC71BM (1:2) indicated a V_oc of 0.72 V, a J_sc of 2.56 mA/cm², and a fill factor (FF) of 0.30, giving a power conversion efficiency of 0.56%. The device including pPTPBDTT-EH and PC71BM (1:2) indicated a V_oc of 0.72 V, a J_sc of 3.61 mA/cm², and a fill factor (FF) of 0.29, giving a power conversion efficiency of 0.74%. The device including pPTPTTI and PC71BM (1:2) indicated a V_oc of 0.83 V, a J_sc of 4.41 mA/cm², and a fill factor (FF) of 0.31, giving a power conversion efficiency of 1.13%. Therefore, pPTPBDT-12, pPTPBDT-EH, pPTPBDTT-EH, and pPTPTTI were synthesized by Stille polymerization. And We find one of the best efficiency for these polymers, called pPTPTTI. Their optical properties were measured and the results show that pyrimidine-based polymers especially like pPTPTTI have a great promise to act as the donor of the active layer.

Keywords: polymer solar cells, pyrimidine-based polymers, photovoltaics, conjugated polymer

Procedia PDF Downloads 163
36 Psychometric Properties of the Eq-5d-3l and Eq-5d-5l Instruments for Health Related Quality of Life Measurement in Indonesian Population

Authors: Dwi Endarti, Susi a Kristina, Rizki Noorizzati, Akbar E Nugraha, Fera Maharani, Kika a Putri, Asninda H Azizah, Sausanzahra Angganisaputri, Yunisa Yustikarini

Abstract:

Cost utility analysis is the most recommended pharmacoeconomic method since it allows widely comparison of cost-effectiveness results from different interventions. The method uses outcome of quality-adjusted life year (QALY) or disability-adjusted life year (DALY). Measurement of QALY requires the data of utility dan life years gained. Utility is measured with the instrument for quality of life measurement such as EQ-5D. Recently, the EQ-5D is available in two versions which are EQ-5D-3L and EQ-5D-5L. This study aimed to compare the EQ-5D-3L and EQ-5D-5L to examine the most suitable version for Indonesian population. This study was an observational study employing cross sectional approach. Data of quality of life measured with EQ-5D-3L and EQ-5D-5L were collected from several groups of population which were respondent with chronic diseases, respondent with acute diseases, and respondent from general population (without illness) in Yogyakarta Municipality, Indonesia. Convenience samples of hypertension patients (83), diabetes mellitus patients (80), and osteoarthritis patients (47), acute respiratory tract infection (81), cephalgia (43), dyspepsia (42), and respondent from general population (293) were recruited in this study. Responses on the 3L and 5L versions of EQ-5D were compared by examining the psychometric properties including agreement, internal consistency, ceiling effect, and convergent validity. Based on psychometric properties tests of EQ-5D-3L dan EQ-5D-5L, EQ-5D-5L tended to have better psychometric properties compared to EQ-5D-3L. Future studies for health related quality of life (HRQOL) measurements for pharmacoeconomic studies in Indonesia should apply EQ-5D-5L.

Keywords: EQ-5D, Health Related Quality of Life, Indonesian Population, Psychometric Properties

Procedia PDF Downloads 441
35 DOG1 Expression Is in Common Human Tumors: A Tissue Microarray Study on More than 15,000 Tissue Samples

Authors: Kristina Jansen, Maximilian Lennartz, Patrick Lebok, Guido Sauter, Ronald Simon, David Dum, Stefan Steurer

Abstract:

DOG1 (Discovered on GIST1) is a voltage-gated calcium-activated chloride and bicarbonate channel that is highly expressed in interstitial cells of Cajal and in gastrointestinal stromal tumors (GIST) derived from Cajal cells. To systematically determine in what tumor entities and normal tissue types DOG1 may be further expressed, a tissue microarray (TMA) containing 15,965 samples from 121 different tumor types and subtypes as well as 608 samples of 76 different normal tissue types were analyzed by immunohistochemistry. DOG1 immunostaining was found in 67 tumor types, including GIST (95.7%), esophageal squamous cell carcinoma (31.9%), pancreatic ductal adenocarcinoma (33.6%), adenocarcinoma of the Papilla Vateri (20%), squamous cell carcinoma of the vulva (15.8%) and the oral cavity (15.3%), mucinous ovarian cancer (15.3%), esophageal adenocarcinoma (12.5%), endometrioid endometrial cancer (12.1%), neuroendocrine carcinoma of the colon (11.1%) and diffuse gastric adenocarcinoma (11%). Low level-DOG1 immunostaining was seen in 17 additional tumor entities. DOG1 expression was unrelated to histopathological parameters of tumor aggressiveness and/or patient prognosis in cancers of the breast (n=1,002), urinary bladder (975), ovary (469), endometrium (173), stomach (233), and thyroid gland (512). High DOG1 expression was linked to estrogen receptor expression in breast cancer (p<0.0001) and the absence of HPV infection in squamous cell carcinomas (p=0.0008). In conclusion, our data identify several tumor entities that can show DOG1 expression levels at similar levels as in GIST. Although DOG1 is tightly linked to a diagnosis of GIST in spindle cell tumors, the differential diagnosis is much broader in DOG1 positive epithelioid neoplasms.

Keywords: biomarker, DOG1, immunohistochemistry, tissue microarray

Procedia PDF Downloads 176
34 Relationship of Indoor and Outdoor Levels of Black Carbon in an Urban Environment

Authors: Daria Pashneva, Julija Pauraite, Agne Minderyte, Vadimas Dudoitis, Lina Davuliene, Kristina Plauskaite, Inga Garbariene, Steigvile Bycenkiene

Abstract:

Black carbon (BC) has received particular attention around the world, not only for its impact on regional and global climate change but also for its impact on air quality and public health. In order to study the relationship between indoor and outdoor BC concentrations, studies were carried out in Vilnius, Lithuania. The studies are aimed at determining the relationship of concentrations, identifying dependencies during the day and week with a further opportunity to analyze the key factors affecting the indoor concentration of BC. In this context, indoor and outdoor continuous real-time measurements of optical BC-related light absorption by aerosol particles were carried out during the cold season (from October to December 2020). The measurement venue was an office located in an urban background environment. Equivalent black carbon (eBC) mass concentration was measured by an Aethalometer (Magee Scientific, model AE-31). The optical transmission of carbonaceous aerosol particles was measured sequentially at seven wavelengths (λ= 370, 470, 520, 590, 660, 880, and 950 nm), where the eBC mass concentration was derived from the light absorption coefficient (σab) at 880 nm wavelength. The diurnal indoor eBC mass concentration was found to vary in the range from 0.02 to 0.08 µgm⁻³, while the outdoor eBC mass concentration - from 0.34 to 0.99 µgm⁻³. Diurnal variations of eBC mass concentration outdoor vs. indoor showed an increased contribution during 10:00 and 12:00 AM (GMT+2), with the highest indoor eBC mass concentration of 0.14µgm⁻³. An indoor/outdoor eBC ratio (I/O) was below one throughout the entire measurement period. The weekend levels of eBC mass concentration were lower than in weekdays for indoor and outdoor for 33% and 28% respectively. Hourly mean mass concentrations of eBC for weekdays and weekends show diurnal cycles, which could be explained by the periodicity of traffic intensity and heating activities. The results show a moderate influence of outdoor eBC emissions on the indoor eBC level.

Keywords: black carbon, climate change, indoor air quality, I/O ratio

Procedia PDF Downloads 160