Search results for: Radhia Helali
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17

Search results for: Radhia Helali

17 Vaccination against Hepatitis B in Tunisian Health Care Workers

Authors: Asma Ammar, Nabiha Bouafia , Asma BenCheikh, Mohamed Mahjoub, Olfa Ezzi, Wadiaa Bannour, Radhia Helali, Mansour Njah

Abstract:

Background: The objective of the present study was to identify factors associated with vaccination against Hepatitis B virus (HBV) among healthcare workers (HWs) in the University Hospital Center (UHC) Farhat Hached Sousse, Tunisia. Methods: We conducted a descriptive cross-sectional study all licensed physicians (n= 206) and a representative sample of paramedical staff (n= 372) exercising at UHC Hached Sousse (Tunisia) during two months (January and February 2014). Data were collected using a self-administered and pre-tested questionnaire, which composed by 21 questions. In order to determinate factors associated with vaccination against hepatitis B among HWs, this questionnaire was based on the Health Belief Model, one of the most classical behavior theories. Logistic regression with the stepwise method of Hosmer and Lemeshow was used to identify the determinants of the use of vaccination against HBV. Results: The response rates were 79.8%. Fifty two percent believe that HBV is frequent in our healthcare units and 60.6% consider it a severe infection. The prevalence of HWs vaccination was 39%, 95% CI [34.49%; 43.5%]. In multivariate analysis, determinants of the use of vaccination against HBV among HWs were young age (p=10-4), male gender (p = 0. 006), high or very high importance accorded to health (p = 0.035), perception membership in a risk group for HBV infection (p = 0.038) and very favorable or favorable opinion about vaccination against HVB (p=10-4). Conclusion: The results of our study should be considered in any strategy for preventing VHB infection in HWs. In the mean time, coverage with standard vaccines should be improved also by supplying complete information on the risks of VHB infection and on the safety and efficacy of vaccination.

Keywords: Hepatitis B virus, healthcare workers, prevalence, vaccination

Procedia PDF Downloads 313
16 Incidence and Risk Factors of Central Venous Associated Infections in a Tunisian Medical Intensive Care Unit

Authors: Ammar Asma, Bouafia Nabiha, Ghammam Rim, Ezzi Olfa, Ben Cheikh Asma, Mahjoub Mohamed, Helali Radhia, Sma Nesrine, Chouchène Imed, Boussarsar Hamadi, Njah Mansour

Abstract:

Background: Central venous catheter associated infections (CVC-AI) are among the serious hospital-acquired infections. The aims of this study are to determine the incidence of CVC-AI, and their risk factors among patients followed in a Tunisian medical intensive care unit (ICU). Materials / Methods: A prospective cohort study conducted between September 15th, 2015 and November 15th, 2016 in an 8-bed medical ICU including all patients admitted for more than 48h. CVC-AI were defined according to CDC of ATLANTA criteria. The enrollment was based on clinical and laboratory diagnosis of CVC-AI. For all subjects, age, sex, underlying diseases, SAPS II score, ICU length of stay, exposure to CVC (number of CVC placed, site of insertion and duration catheterization) were recorded. Risk factors were analyzed by conditional stepwise logistic regression. The p-value of < 0.05 was considered significant. Results: Among 192 eligible patients, 144 patients (75%) had a central venous catheter. Twenty-eight patients (19.4%) had developed CVC-AI with density rate incidence 20.02/1000 CVC-days. Among these infections, 60.7% (n=17) were systemic CVC-AI (with negative blood culture), and 35.7% (n=10) were bloodstream CVC-AI. The mean SAPS II of patients with CVC-AI was 32.76 14.48; their mean Charlson index was 1.77 1.55, their mean duration of catheterization was 15.46 10.81 days and the mean duration of one central line was 5.8+/-3.72 days. Gram-negative bacteria was determined in 53.5 % of CVC-AI (n= 15) dominated by multi-drug resistant Acinetobacter baumani (n=7). Staphylococci were isolated in 3 CVC-AI. Fourteen (50%) patients with CVC-AI died. Univariate analysis identified men (p=0.034), the referral from another hospital department (p=0.03), tobacco (p=0.006), duration of sedation (p=0.003) and the duration of catheterization (p=0), as possible risk factors of CVC-AI. Multivariate analysis showed that independent factors of CVC-AI were, male sex; OR= 5.73, IC 95% [2; 16.46], p=0.001, Ramsay score; OR= 1.57, IC 95% [1.036; 2.38], p=0.033, and duration of catheterization; OR=1.093, IC 95% [1.035; 1.15], p=0.001. Conclusion: In a monocenter cohort, CVC-AI had a high density and is associated with poor outcome. Identifying the risk factors is necessary to find solutions for this major health problem.

Keywords: central venous catheter associated infection, intensive care unit, prospective cohort studies, risk factors

Procedia PDF Downloads 335
15 Hybrid Hierarchical Clustering Approach for Community Detection in Social Network

Authors: Radhia Toujani, Jalel Akaichi

Abstract:

Social Networks generally present a hierarchy of communities. To determine these communities and the relationship between them, detection algorithms should be applied. Most of the existing algorithms, proposed for hierarchical communities identification, are based on either agglomerative clustering or divisive clustering. In this paper, we present a hybrid hierarchical clustering approach for community detection based on both bottom-up and bottom-down clustering. Obviously, our approach provides more relevant community structure than hierarchical method which considers only divisive or agglomerative clustering to identify communities. Moreover, we performed some comparative experiments to enhance the quality of the clustering results and to show the effectiveness of our algorithm.

Keywords: agglomerative hierarchical clustering, community structure, divisive hierarchical clustering, hybrid hierarchical clustering, opinion mining, social network, social network analysis

Procedia PDF Downloads 323
14 Adaptive Routing Protocol for Dynamic Wireless Sensor Networks

Authors: Fayez Mostafa Alhamoui, Adnan Hadi Mahdi Al- Helali

Abstract:

The main issue in designing a wireless sensor network (WSN) is the finding of a proper routing protocol that complies with the several requirements of high reliability, short latency, scalability, low power consumption, and many others. This paper proposes a novel routing algorithm that complies with these design requirements. The new routing protocol divides the WSN into several sub-networks and each sub-network is divided into several clusters. This division is designed to reduce the number of radio transmission and hence decreases the power consumption. The network division may be changed dynamically to adapt with the network changes and allows the realization of the design requirements.

Keywords: wireless sensor networks, routing protocols, AD HOC topology, cluster, sub-network, WSN design requirements

Procedia PDF Downloads 505
13 A Model Based Metaheuristic for Hybrid Hierarchical Community Structure in Social Networks

Authors: Radhia Toujani, Jalel Akaichi

Abstract:

In recent years, the study of community detection in social networks has received great attention. The hierarchical structure of the network leads to the emergence of the convergence to a locally optimal community structure. In this paper, we aim to avoid this local optimum in the introduced hybrid hierarchical method. To achieve this purpose, we present an objective function where we incorporate the value of structural and semantic similarity based modularity and a metaheuristic namely bees colonies algorithm to optimize our objective function on both hierarchical level divisive and agglomerative. In order to assess the efficiency and the accuracy of the introduced hybrid bee colony model, we perform an extensive experimental evaluation on both synthetic and real networks.

Keywords: social network, community detection, agglomerative hierarchical clustering, divisive hierarchical clustering, similarity, modularity, metaheuristic, bee colony

Procedia PDF Downloads 348
12 Microstructural and Transport Properties of La0.7Sr0.3CoO3 Thin Films Obtained by Metal-Organic Deposition

Authors: K. Daoudi, Z. Othmen, S. El Helali, M.Oueslati, M. Oumezzine

Abstract:

La0.7Sr0.3CoO3 thin films have been epitaxially grown on LaAlO3 and SrTiO3 (001) single-crystal substrates by metal organic deposition process. The structural and micro structural properties of the obtained films have been investigated by means of high resolution X-ray diffraction, Raman spectroscopy and transmission microscopy observations on cross-sections techniques. We noted a close dependence of the crystallinity on the used substrate and the film thickness. By increasing the annealing temperature to 1000ºC and the film thickness to 100 nm, the electrical resistivity was decreased by several orders of magnitude. The film resistivity reaches approximately 3~4 x10-4 Ω.cm in a wide interval of temperature 77-320 K, making this material a promising candidate for a variety of applications.

Keywords: cobaltite, thin films, epitaxial growth, MOD, TEM

Procedia PDF Downloads 309
11 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 507
10 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 586
9 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 448
8 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 319
7 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 533
6 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 344
5 Rheological Model for Describing Spunlace Nonwoven Behavior

Authors: Sana Ridene, Soumaya Sayeb, Houda Helali, Mohammed Ben Hassen

Abstract:

Nonwoven structures have a range of applications which include Medical, filtration, geotextile and recently this unconventional fabric is finding a niche in fashion apparel. In this paper, a modified form of Vangheluwe rheological model is used to describe the mechanical behavior of nonwovens fabrics in uniaxial tension. This model is an association in parallel of three Maxwell elements characterized by damping coefficients η1, η2 and η3 and E1, E2, E3 elastic modulus and a nonlinear spring C. The model is verified experimentally with two types of nonwovens (50% viscose /50% Polyester) and (40% viscose/60% Polyester) and a range of three square weights values. Comparative analysis of the theoretical model and the experimental results of tensile test proofs a high correlation between them. The proposed model can fairly well replicate the behavior of nonwoven fabrics during relaxation and sample traction. This allowed us to predict the mechanical behavior in tension and relaxation of fabrics starting only from their technical parameters (composition and weight).

Keywords: mechanical behavior, tensile strength, relaxation, rheological model

Procedia PDF Downloads 377
4 Evaluation of the Antibacterial Activity of New Dermaseptin Derivatives Against Acinetobacter Baumannii

Authors: Houda Haddad, Radhia Mejri, , Alyne Rodrigues de Araujo, Amira Zairi

Abstract:

Nosocomial infections represent one of the biggest health problems nowadays. Acinetobacter baumannii is known as an opportunistic pathogen in humans, affecting people with compromised immune systems, and is becoming increasingly important as a hospital-derived infection. It is known that in recent years, more and more bacteria have become multidrug-resistant (MDR), and for this reason, the development of new drugs is a priority. However, these products must not affect the human body, and therefore, cytotoxicity studies are mandatory. In this context, antimicrobial peptides with potential antibacterial proprieties could be an alternative. In this research, we describe the synthesis and the bioactivity of dermaseptins and their derivatives against Acinetobacter baumannii. The cytotoxicity of these dermaseptins was investigated on the HEp-2 cell line by the MTT cell viability assay. Thereafter, we studied morphological alterations caused by the action of one of the active peptides on the bacterial membrane using atomic force microscopy (AFM). The cytotoxicity of dermaseptins was concentration-dependent at microgram concentrations. It was observed that all tested analogs exhibit antibacterial activity with Minimum Inhibitory Concentrations (MICs) ranging from 3.125 to 12.5 μg/mL and Minimum Bactericidal Concentrations (MBCs) ranging from 6.25 to 25 μg/mL. Microscopic images obtained by AFM revealed morphological changes on the surface of treated bacteria caused by K4S4(1-16), as well as significant surface alterations. Overall, these findings demonstrate that dermaseptins might constitute new lead structures for the development of potent antibacterial agents against Acinetobacter baumannii infections.

Keywords: dermaseptin B2, dermaseptin S4, analogs, Acinetobacter baumannii, healthcare-associated infections, antibacterial activity

Procedia PDF Downloads 17
3 Balance Transfer of Heavy Metals in Marine Environments Subject to Natural and Anthropogenic Inputs: A Case Study on the Mejerda River Delta

Authors: Mohamed Amine Helali, Walid Oueslati, Ayed Added

Abstract:

Sedimentation rates and total fluxes of heavy metals (Fe, Mn, Pb, Zn and Cu) was measured in three different depths (10m, 20m and 40m) during March and August 2012, offshore of the Mejerda River outlet (Gulf of Tunis, Tunisia). The sedimentation rates are estimated from the fluxes of the suspended particulate matter at 7.32, 5.45 and 4.39 mm y⁻¹ respectively at 10m, 20m and 40m depth. Heavy metals sequestration in sediments was determined by chemical speciation and the total metal contents in each core collected from 10, 20 and 40m depth. Heavy metals intake to the sediment was measured also from the suspended particulate matter, while the fluxes from the sediment to the water column was determined using the benthic chambers technique and from the diffusive fluxes in the pore water. Results shown that iron is the only metal for which the balance transfer between intake/uptake (45 to 117 / 1.8 to 5.8 g m² y⁻¹) and sequestration (277 to 378 g m² y⁻¹) was negative, at the opposite of the Lead which intake fluxes (360 to 480 mg m² y⁻¹) are more than sequestration fluxes (50 to 92 mg m² y⁻¹). The balance transfer is neutral for Mn, Zn, and Cu. These clearly indicate that the contributions of Mejerda have consistently varied over time, probably due to the migration of the River mouth and to the changes in the mining activity in the Mejerda catchment and the recent human activities which affect the delta area.

Keywords: delta, fluxes, heavy metals, sediments, sedimentation rates

Procedia PDF Downloads 176
2 The Place of Herbal Teas Based on Medicinal Plants in the Treatment and Comfort of Infants

Authors: Metahri Leyla, Helali Amal, Dali Yahia Mustapha Kamel

Abstract:

Herbal medicine is one of the oldest medicines in the world. It constitutes an interesting alternative to treat and cure without creating new diseases. Despite the progress of medicine, the increase in the number of doctors, the creation of social security, many parents have resorted to herbal medicine for their children; they are increasingly asking for "natural remedies", "without risk" for their children. Herbal tea is a very accessible way to enjoy the benefits of herbal medicine. Accordingly; the objective of our study is to obtain detailed information on the composition and mode of administration of these herbal teas and to identify the different plants used; their beneficial effects, as well as their possible toxicity. The current research work represents an ethnobotanical survey spread over one month (from January 6, 2021 to February 19, 2021) carried out by means of an electronic questionnaire concerning 753 respondents, involving single or multiparous mothers. The obtained results reveal that a total of 684 mothers used herbal teas for their infants, which revealed the use of 55 herbal remedies for several indications, the most sought after are the carminative effect and relief of colic, and which 9% of users noticed undesirable effects linked to the administration of herbal teas to their infants. As a conclusion, it has been asserted that the use of herbal teas as a natural remedy by Algerian mothers is a widely accepted practice, however the "natural" nature of the plants does not mean that they are harmless.

Keywords: Keywords: Herbal medicine, Herbal teas, Children, Mothers, Medicinal plants.

Procedia PDF Downloads 59
1 Effect of Organic Matter Pre-Treatment on Germination and Seedlings Growth Indices on Marigold (Calendula officinalis L.) under Drought Stress

Authors: Fahimeh Helali Soltanahmadi, Alireza Nourabdi

Abstract:

To investigate the effects of seed pretreatment on drought tolerance, an experimental Marigold (Calendula officinalis L) was tested in 2017-2018. A germination experiment was performed in the laboratory of Urmia University. The experiment was performed as a factorial experiment in a completely randomized design with three replications. The experimental treatments were dry levels of polyethylene glycol in four levels (control, -3, -6 and -9 bar) and treatments of Humic acid (72 mg / l), salicylic acid (2000 μmol) and ascorbic acid (200 ppm), and control were performed. The results of the germination experiment showed that with increasing drought levels caused by polyethylene glycol, germination indices were significantly reduced, so that the highest value obtained from the measured traits was observed in normal irrigation and in priming treatments, and the lowest amount of these traits was observed at the -9 bar drought level due to polyethylene glycol in the control treatment. The results of this study showed an increase in drought tolerance and improved Marigold germination under stress by applying seed priming with salicylic acid, which is recommended in sustainable and organic agriculture.

Keywords: Marigold, organic matter, seed pretreatment, drought stress, allometric coefficient

Procedia PDF Downloads 18