Search results for: Umair Rashid
175 Effect of Monotonically Decreasing Parameters on Margin Softmax for Deep Face Recognition
Authors: Umair Rashid
Abstract:
Normally softmax loss is used as the supervision signal in face recognition (FR) system, and it boosts the separability of features. In the last two years, a number of techniques have been proposed by reformulating the original softmax loss to enhance the discriminating power of Deep Convolutional Neural Networks (DCNNs) for FR system. To learn angularly discriminative features Cosine-Margin based softmax has been adjusted as monotonically decreasing angular function, that is the main challenge for angular based softmax. On that issue, we propose monotonically decreasing element for Cosine-Margin based softmax and also, we discussed the effect of different monotonically decreasing parameters on angular Margin softmax for FR system. We train the model on publicly available dataset CASIA- WebFace via our proposed monotonically decreasing parameters for cosine function and the tests on YouTube Faces (YTF, Labeled Face in the Wild (LFW), VGGFace1 and VGGFace2 attain the state-of-the-art performance.Keywords: deep convolutional neural networks, cosine margin face recognition, softmax loss, monotonically decreasing parameter
Procedia PDF Downloads 101174 Cost Comparison between R.C.C. Structures and Composite Columns Structures
Authors: Assad Rashid, Umair Ahmed, Zafar Baig
Abstract:
A new trend in construction is widely influenced by the use of Steel-Concrete Composite Columns. The rapid growth in Steel-Concrete Composite construction has widely decreased the conventional R.C.C structures. Steel Concrete composite construction has obtained extensive receiving around the globe. It is considering the fact that R.C.C structures construction is most suitable and economical for low-rise construction, so it is used in farming systems in most of the buildings. However, increased dead load, span restriction, less stiffness and risky formwork make R.C.C construction uneconomical and not suitable when it comes to intermediate to high-rise buildings. A Base + Ground +11 storey commercial building was designed on ETABS 2017 and made a comparison between conventional R.C.C and encased composite column structure. After performing Equivalent Static non-linear analysis, it has been found that construction cost is 13.01% more than R.C.C structure but encased composite column building has 7.7% more floor area. This study will help in understanding the behavior of conventional R.C.C structure and Encased Composite column structure.Keywords: composite columns structure, equivalent static non-linear analysis, comparison between R.C.C and encased composite column structures, cost-effective structure
Procedia PDF Downloads 198173 Political Behavior and Democratic Values: Framing Analysis of Political Discussion Programs in Pakistan
Authors: Umair Nadeem, Sidra Umair
Abstract:
Political behavior of voters and democratic values have been observed an emerging phenomenon in recent years in Pakistan. Privatized TV news channels are taking one sided position on the political issues, corresponding with respective political parties. Since last decade, TV News Channels have undermined this monopoly. Elections 2013 were unique in Pakistan with reference to political behavior and democratic values. Partisan narratives and counter narratives have been witnessed on different TV channels, in last few years. These mediated events seem very important to study the political behavior and democratic values as the country is approaching towards elections 2018. This endeavor is an attempt to capture the framing of the parties, issues in the partisan media culture and framing effects on political behavior of voters. Data for this research come from two data set. Content analysis of selected representative talks shows broadcast on mainstream news channels provide an assessment of the framing while quantitative survey of the discussion program’s viewers from Lahore city provide an evidence of framing effects on political behavior on voters and on democratic values. Regression results help us to argue that the highly partisan shows are strong predictors of polarized views among the audience. Study also grasp the attention of scholars towards the implications of this phenomenon.Keywords: democratic values, partisan media, polarized views, political behavior
Procedia PDF Downloads 181172 Analysis of Sea Waves Characteristics and Assessment of Potential Wave Power in Egyptian Mediterranean Waters
Authors: Ahmed A. El-Gindy, Elham S. El-Nashar, Abdallah Nafaa, Sameh El-Kafrawy
Abstract:
The generation of energy from marine energy became one of the most preferable resources since it is a clean source and friendly to environment. Egypt has long shores along Mediterranean with important cities that need energy resources with significant wave energy. No detailed studies have been done on wave energy distribution in the Egyptian waters. The objective of this paper is to assess the energy wave power available in the Egyptian waters for the choice of the most suitable devices to be used in this area. This paper deals the characteristics and power of the offshore waves in the Egyptian waters. Since the field observations of waves are not frequent and need much technical work, the European Centre for Medium-Range Weather Forecasts (ECMWF) interim reanalysis data in Mediterranean, with a grid size 0.75 degree, which is a relatively course grid, are considered in the present study for preliminary assessment of sea waves characteristics and power. The used data covers the period from 2012 to 2014. The data used are significant wave height (swh), mean wave period (mwp) and wave direction taken at six hourly intervals, at seven chosen stations, and at grid points covering the Egyptian waters. The wave power (wp) formula was used to calculate energy flux. Descriptive statistical analysis including monthly means and standard deviations of the swh, mwp, and wp. The percentiles of wave heights and their corresponding power are done, as a tool of choice of the best technology suitable for the site. The surfer is used to show spatial distributions of wp. The analysis of data at chosen 7 stations determined the potential of wp off important Egyptian cities. Offshore of Al Saloum and Marsa Matruh, the highest wp occurred in January and February (16.93-18.05) ± (18.08-22.12) kw/m while the lowest occurred in June and October (1.49-1.69) ± (1.45-1.74) kw/m. In front of Alexandria and Rashid, the highest wp occurred in January and February (16.93-18.05) ± (18.08-22.12) kw/m while the lowest occurred in June and September (1.29-2.01) ± (1.31-1.83) kw/m. In front of Damietta and Port Said, the highest wp occurred in February (14.29-17.61) ± (21.61-27.10) kw/m and the lowest occurred in June (0.94-0.96) ± (0.71-0.72) kw/m. In winter, the probabilities of waves higher than 0.8 m in percentage were, at Al Saloum and Marsa Matruh (76.56-80.33) ± (11.62-12.05), at Alexandria and Rashid (73.67-74.79) ± (16.21-18.59) and at Damietta and Port Said (66.28-68.69) ± (17.88-17.90). In spring, the percentiles were, at Al Saloum and Marsa Matruh, (48.17-50.92) ± (5.79-6.56), at Alexandria and Rashid, (39.38-43.59) ± (9.06-9.34) and at Damietta and Port Said, (31.59-33.61) ± (10.72-11.25). In summer, the probabilities were, at Al Saloum and Marsa Matruh (57.70-66.67) ± (4.87-6.83), at Alexandria and Rashid (59.96-65.13) ± (9.14-9.35) and at Damietta and Port Said (46.38-49.28) ± (10.89-11.47). In autumn, the probabilities were, at Al Saloum and Marsa Matruh (58.75-59.56) ± (2.55-5.84), at Alexandria and Rashid (47.78-52.13) ± (3.11-7.08) and at Damietta and Port Said (41.16-42.52) ± (7.52-8.34).Keywords: distribution of sea waves energy, Egyptian Mediterranean waters, waves characteristics, waves power
Procedia PDF Downloads 190171 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 642170 Analysis of Fixed Beamforming Algorithms for Smart Antenna Systems
Authors: Muhammad Umair Shahid, Abdul Rehman, Mudassir Mukhtar, Muhammad Nauman
Abstract:
The smart antenna is the prominent technology that has become known in recent years to meet the growing demands of wireless communications. In an overcrowded atmosphere, its application is growing gradually. A methodical evaluation of the performance of Fixed Beamforming algorithms for smart antennas such as Multiple Sidelobe Canceller (MSC), Maximum Signal-to-interference ratio (MSIR) and minimum variance (MVDR) has been comprehensively presented in this paper. Simulation results show that beamforming is helpful in providing optimized response towards desired directions. MVDR beamformer provides the most optimal solution.Keywords: fixed weight beamforming, array pattern, signal to interference ratio, power efficiency, element spacing, array elements, optimum weight vector
Procedia PDF Downloads 179169 Weyl Type Theorem and the Fuglede Property
Authors: M. H. M. Rashid
Abstract:
Given H a Hilbert space and B(H) the algebra of bounded linear operator in H, let δAB denote the generalized derivation defined by A and B. The main objective of this article is to study Weyl type theorems for generalized derivation for (A,B) satisfying a couple of Fuglede.Keywords: Fuglede Property, Weyl’s theorem, generalized derivation, Aluthge transform
Procedia PDF Downloads 127168 Seersucker Fabrics Development Using Single Warp Beam
Authors: Khubab Shaker, Yasir Nawab, Muhammad Usman Javed, Muhammad Umair, Muhammad Maqsood
Abstract:
Seersucker is a thin and puckered fabric commonly striped or chequered, used to make clothing for spring and woven in such a way that some threads bunch together, giving the fabric a wrinkled appearance in places. Due to use of two warp beams, such fabrics were not possible to weave on conventional weaving machines. Objective of this study was to weave a seersucker fabric on conventional looms using single warp beam. This objective was achieved using two types of yarns, forming stripes in weft: one being 100% cotton yarn and the other core spun elastane yarn with sheath of cotton (95.7% cotton and 4.3% elastane). Stress-strain behaviour of the produced fabric samples were tested and explained.Keywords: seersucker fabrics, elastane yarns, single warp beam, weaving
Procedia PDF Downloads 524167 A Comparative Study between Different Techniques of Off-Page and On-Page Search Engine Optimization
Authors: Ahmed Ishtiaq, Maeeda Khalid, Umair Sajjad
Abstract:
In the fast-moving world, information is the key to success. If information is easily available, then it makes work easy. The Internet is the biggest collection and source of information nowadays, and with every single day, the data on internet increases, and it becomes difficult to find required data. Everyone wants to make his/her website at the top of search results. This can be possible when you have applied some techniques of SEO inside your application or outside your application, which are two types of SEO, onsite and offsite SEO. SEO is an abbreviation of Search Engine Optimization, and it is a set of techniques, methods to increase users of a website on World Wide Web or to rank up your website in search engine indexing. In this paper, we have compared different techniques of Onpage and Offpage SEO, and we have suggested many things that should be changed inside webpage, outside web page and mentioned some most powerful and search engine considerable elements and techniques in both types of SEO in order to gain high ranking on Search Engine.Keywords: auto-suggestion, search engine optimization, SEO, query, web mining, web crawler
Procedia PDF Downloads 147166 Powers of Class p-w A (s, t) Operators Associated with Generalized Aluthge Transformations
Authors: Mohammed Husein Mohammed Rashid
Abstract:
Let Τ = U |Τ| be a polar decomposition of a bounded linear operator T on a complex Hilbert space with ker U = ker |T|. T is said to be class p-w A(s,t) if (|T*|ᵗ|T|²ˢ|T*|ᵗ )ᵗᵖ/ˢ⁺ᵗ ≥|T*|²ᵗᵖ and |T|²ˢᵖ ≥ (|T|ˢ|T*|²ᵗ|T|ˢ)ˢᵖ/ˢ⁺ᵗ with 0Keywords: class p-w A (s, t), normaloid, isoloid, finite, orthogonality
Procedia PDF Downloads 116165 Behavioral Problems Among Down Syndrome Children in the Special Education Complex Peshawar
Authors: Huma Atta, Ishrat Rehman, Muhammad Umair
Abstract:
Objective: To find out the effectiveness of Dr. Stein behavioural modification strategies among Down syndrome children’s behavioural problems. Material & Methods: We took a group of individuals (aged 8-16) having Down syndrome from national special education complex, Peshawar. They were assessed through the behavioural problem index to give us an idea on their behaviour problems, those with a behavioural problem were kept in therapy for further sessions to help them improve. Results: A treatment plan was made according to the extracted behavioural problems of Down syndrome children. Dr. Stein recommended behavioural modification treatment strategies were used for behavioural modification of Down syndrome children (Routine, reward, choice, redirection and consistency). Pre-intervention (M=69.11, SD=6.27) and post-intervention (M=61.33, SD=6.51) conditions; t (8) =2.70, p=0.027. Conclusion: After the successful completion of 9 sessions with Down syndrome children, their behavioural problems were reassessed. Results indicated that Dr. Stein behavioural modification strategy is an effective treatment plan for the modification of behavioural problems among Down syndrome children.Keywords: behavior, down syndrome, treatment, strategies
Procedia PDF Downloads 9164 Intrusion Detection Techniques in NaaS in the Cloud: A Review
Authors: Rashid Mahmood
Abstract:
The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.Keywords: IDS, cloud, naas, detection
Procedia PDF Downloads 318163 Exploiting Fast Independent Component Analysis Based Algorithm for Equalization of Impaired Baseband Received Signal
Authors: Muhammad Umair, Syed Qasim Gilani
Abstract:
A technique using Independent Component Analysis (ICA) for blind receiver signal processing is investigated. The problem of the receiver signal processing is viewed as of signal equalization and implementation imperfections compensation. Based on this, a model similar to a general ICA problem is developed for the received signal. Then, the use of ICA technique for blind signal equalization in the time domain is presented. The equalization is regarded as a signal separation problem, since the desired signal is separated from interference terms. This problem is addressed in the paper by over-sampling of the received signal. By using ICA for equalization, besides channel equalization, other transmission imperfections such as Direct current (DC) bias offset, carrier phase and In phase Quadrature phase imbalance will also be corrected. Simulation results for a system using 16-Quadraure Amplitude Modulation(QAM) are presented to show the performance of the proposed scheme.Keywords: blind equalization, blind signal separation, equalization, independent component analysis, transmission impairments, QAM receiver
Procedia PDF Downloads 213162 Personality Traits of Students Effecting Entrepreneurial Intention
Authors: Muhammad Ali, Aamir Sohail, Umair Malik
Abstract:
Research in entrepreneurship has gained much attention in current academic environment. Youngsters are taking interest to start their own business in spite of risk matter. The objective of the study is to explain how various personality traits (personal attitude, locus of control, instrumental readiness and perceived behavioral control) are affecting entrepreneurial intention of students. The theory of planned behavior supports out study which explains that personal attractiveness, social norms and feasibility are the main factors that affect intentions of an individual. The sample data of 120 is collected from graduating batch of three reputed universities of Islamabad through questionnaires. Our results support the hypothesis that personality traits positively influence the entrepreneurial intention. We conclude from the study that many graduating students are willing to start a new venture, but most of them are likely to do a job in their respective fields. Risk factor also exists in their minds because in our country most people are risk-averse and they do not want to lose their money in case of loss.Keywords: entrepreneurship, instrumental readiness, locus of control, personal attitude
Procedia PDF Downloads 202161 The Impact of Recurring Events in Fake News Detection
Authors: Ali Raza, Shafiq Ur Rehman Khan, Raja Sher Afgun Usmani, Asif Raza, Basit Umair
Abstract:
Detection of Fake news and missing information is gaining popularity, especially after the advancement in social media and online news platforms. Social media platforms are the main and speediest source of fake news propagation, whereas online news websites contribute to fake news dissipation. In this study, we propose a framework to detect fake news using the temporal features of text and consider user feedback to identify whether the news is fake or not. In recent studies, the temporal features in text documents gain valuable consideration from Natural Language Processing and user feedback and only try to classify the textual data as fake or true. This research article indicates the impact of recurring and non-recurring events on fake and true news. We use two models BERT and Bi-LSTM to investigate, and it is concluded from BERT we get better results and 70% of true news are recurring and rest of 30% are non-recurring.Keywords: natural language processing, fake news detection, machine learning, Bi-LSTM
Procedia PDF Downloads 21160 Green Human Recourse Environment Performance, Circular Performance Environment Reputation and Economics Performance: The Moderating Role of CEO Ethical Leadership
Authors: Muhammad Umair Ahmed, Aftab Shoukat
Abstract:
Today the global economy has become one of the key strategies in dealing with environmental issues. To allow for a round economy, organizations have begun to work to improve their sustainability management. The contribution of green resource management to the transformation of the global economy has not been investigated. The purpose of the study was to evaluate the effects of green labor management on the global economy, environmental and economic performance, and the organisation's environmental dignity. We strongly evaluate the different roles of the various processes of green personnel management (i.e., green recruitment, training, and engagement green, as well as green performance management and reward) in organizational operations. We are also investigating the leadership role of CEO Ethical. Our outcome will have a positive impact on the performance of the organization. Green Human Resource Management contributes to the evolution of a roundabout economy without the influence of different external factors such as market demand and commitment. Finally, the results of our research will provide a few aspects for future research, both academic and human.Keywords: sustainability, green human resource management, circular economy, human capital
Procedia PDF Downloads 89159 Fuglede-Putnam Theorem for ∗-Class A Operators
Authors: Mohammed Husein Mohammad Rashid
Abstract:
For a bounded linear operator T acting on a complex infinite dimensional Hilbert space ℋ, we say that T is ∗-class A operator (abbreviation T∈A*) if |T²|≥ |T*|². In this article, we prove the following assertions:(i) we establish some conditions which imply the normality of ∗-class A; (ii) we consider ∗-class A operator T ∈ ℬ(ℋ) with reducing kernel such that TX = XS for some X ∈ ℬ(K, ℋ) and prove the Fuglede-Putnam type theorem when adjoint of S ∈ ℬ(K) is dominant operators; (iii) furthermore, we extend the asymmetric Putnam-Fuglede theorem the class of ∗-class A operators.Keywords: fuglede-putnam theorem, normal operators, ∗-class a operators, dominant operators
Procedia PDF Downloads 87158 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Authors: Rashid Mahmood, Muhammad Junaid Sarwar
Abstract:
Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.Keywords: MANET, IDS, intrusions, signature, detection, prevention
Procedia PDF Downloads 377157 Stability of Property (gm) under Perturbation and Spectral Properties Type Weyl Theorems
Authors: M. H. M. Rashid
Abstract:
A Banach space operator T obeys property (gm) if the isolated points of the spectrum σ(T) of T which are eigenvalues are exactly those points λ of the spectrum for which T − λI is a left Drazin invertible. In this article, we study the stability of property (gm), for a bounded operator acting on a Banach space, under perturbation by finite rank operators, by nilpotent operators, by quasi-nilpotent operators, or more generally by algebraic operators commuting with T.Keywords: Weyl's Theorem, Weyl Spectrum, Polaroid operators, property (gm)
Procedia PDF Downloads 177156 Television Commercial Ideation: Considerations for the Future
Authors: Rashid Farooq, Moazzam Naseer, Rehan Hasan
Abstract:
Increasing challenges posed to the creativity in the discipline of advertising during time’s movement towards the maturity of The Third Wave – a concept of change by Toffler, have to be the major theme of this study. Creative concepts for the changing media landscape are becoming a challenge for the creative industry as Stein says that the usefulness is a dimension no creative work could avoid. Furthermore, Spencer points out that the global capitalist society provides a base for the development of digital technologies. Innovation within the discipline of creativity is reshaping this process. In this review article, the role of creativity and innovation in the development and delivery of the message has to be examined.Keywords: advertising, creativity, ideation, new media
Procedia PDF Downloads 217155 Blockchain for IoT Security and Privacy in Healthcare Sector
Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab
Abstract:
The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data
Procedia PDF Downloads 177154 Impact of Dairy Polysaccharides on Caloric Intake and Postprandial Metabolic Responses in Young Adults
Authors: Muhammad Umair Arshad, Saima Ishtiaq, Ali Imran
Abstract:
Different polysaccharides contribute towards the management of glycemic and satiety and consequently manage the metabolic syndrome. In the present study, we compared the postprandial glycemic and satiety responses of different dietary polysaccharides when added to milk (2% Milk Fat). The objective of this study was to evaluate different polysaccharides against postprandial glucose, appetite responses, and food intake at subsequent meals. In a repeated measures crossover design, 30 females (18–30 years) consumed 250 ml milk with 2% M.F. (control), or milk with carrageenan (2.5 g), guar gum (2.5 g) and alginate (2.5 g), followed by an ad libitum pizza meal after 120 min. Alginate and guar gum addition resulted in lower caloric intake at subsequent pizza meal. The post-treatment (0–120 min) glucose and average appetite were suppressed by alginate and guar gum (p < 0.0001), with a more pronounced effect of guar gum. However, alginate resulted in lower blood glucose (p < 0.0001) compared with control and carrageenan during post-treatment. Alginate and guar gum, added milk, and other beverages would be beneficial in the short-term regulation of postprandial glycemia and satiety.Keywords: satiety, glycemic control, milk polysaccharides, food intake
Procedia PDF Downloads 67153 Review of Cable Fault Locating Methods and Usage of VLF for Real Cases of High Resistance Fault Locating
Authors: Saadat Ali, Rashid Abdulla Ahmed Alshehhi
Abstract:
Cable faults are always probable and common during or after commissioning, causing significant delays and disrupting power distribution or transmission network, which is intolerable for the utilities&service providers being their reliability and business continuity measures. Therefore, the adoption of rapid localization & rectification methodology is the main concern for them. This paper explores the present techniques available for high voltage cable localization & rectification and which is preferable with regards to easier, faster, and also less harmful to cables. It also provides insight experience of high resistance fault locating by utilization of the Very Low Frequency (VLF) method.Keywords: faults, VLF, real cases, cables
Procedia PDF Downloads 111152 Implications of Human Cytomegalovirus as a Protective Factor in the Pathogenesis of Breast Cancer
Authors: Marissa Dallara, Amalia Ardeljan, Lexi Frankel, Nadia Obaed, Naureen Rashid, Omar Rashid
Abstract:
Human Cytomegalovirus (HCMV) is a ubiquitous virus that remains latent in approximately 60% of individuals in developed countries. Viral load is kept at a minimum due to a robust immune response that is produced in most individuals who remain asymptomatic. HCMV has been recently implicated in cancer research because it may impose oncomodulatory effects on tumor cells of which it infects, which could have an impact on the progression of cancer. HCMV has been implicated in increased pathogenicity of certain cancers such as gliomas, but in contrast, it can also exhibit anti-tumor activity. HCMV seropositivity has been recorded in tumor cells, but this may also have implications in decreased pathogenesis of certain forms of cancer such as leukemia as well as increased pathogenesis in others. This study aimed to investigate the correlation between cytomegalovirus and the incidence of breast cancer. Methods The data used in this project was extracted from a Health Insurance Portability and Accountability Act (HIPAA) compliant national database to analyze the patients infected versus patients not infection with cytomegalovirus using ICD-10, ICD-9 codes. Permission to utilize the database was given by Holy Cross Health, Fort Lauderdale, for the purpose of academic research. Data analysis was conducted using standard statistical methods. Results The query was analyzed for dates ranging from January 2010 to December 2019, which resulted in 14,309 patients in both the infected and control groups, respectively. The two groups were matched by age range and CCI score. The incidence of breast cancer was 1.642% and 235 patients in the cytomegalovirus group compared to 4.752% and 680 patients in the control group. The difference was statistically significant by a p-value of less than 2.2x 10^-16 with an odds ratio of 0.43 (0.4 to 0.48) with a 95% confidence interval. Investigation into the effects of HCMV treatment modalities, including Valganciclovir, Cidofovir, and Foscarnet, on breast cancer in both groups was conducted, but the numbers were insufficient to yield any statistically significant correlations. Conclusion This study demonstrates a statistically significant correlation between cytomegalovirus and a reduced incidence of breast cancer. If HCMV can exert anti-tumor effects on breast cancer and inhibit growth, it could potentially be used to formulate immunotherapy that targets various types of breast cancer. Further evaluation is warranted to assess the implications of cytomegalovirus in reducing the incidence of breast cancer.Keywords: human cytomegalovirus, breast cancer, immunotherapy, anti-tumor
Procedia PDF Downloads 207151 Awareness About Breast Cancer in Young Pakistani Women
Authors: Marshal Rashid
Abstract:
In Pakistan, one in nine women develops breast cancer at some stage of their lives. Every year thousands of females lose their lives due to lack of awareness, several women do not share their health issues with others and are shy to go for any kind of breast examination. An inductive approach was used to analyze the data which resulted in the emergence of eight subthemes under the umbrella of three major themes that delineate individual, socio-cultural and structural barriers to seek screening and treatment of breast cancer in Pakistan. Individual barriers included lack of awareness, hesitance in accepting social support, and spiritual healing. The identified socio-cultural factors included feminine sensitivity, stigmatization, and aversion to male doctors.Keywords: breast, cancer, women, Pakistan
Procedia PDF Downloads 161150 Effect of Cloud Computing on Enterprises
Authors: Amir Rashid
Abstract:
Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS
Procedia PDF Downloads 339149 Biometry and Pathology of Internal Genital Organs of Female Camel (Camelus dromedarius) in Lahore, Pakistan
Authors: Umair Riaz, Mudassar Iqbal, Umer Farooq, Farah Ali, Musadiq Idris
Abstract:
The present work was designed to establish biometrical norms for ovaries, oviducts and crevices of one humped camels (Camelus dromedarius) and the diseases associated thereof in various age groups viz. calves (< 2 years, n=15), heifers (2-4 years, n=34) and adults (> 4 years, n=81). The genitalia were attained from Lahore Abbatoir, Punjab, Pakistan. Ovaries, oviducts and cervices of experimental genitalia were assessed for their length, width, thickness and weight. Statistically, there was no difference in the length and width of both left and right ovaries which however, increased with the advancement of age of camel. Similar results were noticed regarding the width of oviducts. The mean length of cervices of female camels correlated well with the number of cervical annular rings amongst the age groups. Regarding the abnormalities of ovaries and cervices in the 3 age groups, camel calves did not have any of the abnormalities. However, ovarian hypoplasia in heifers (2.94%) and follicular cyst in adult female camels (1.23%) were revealed in the present study. Mucocervix in heifers (2.96%) and cervicitis 1.23% in adult camels was also noticed. The present work presents a preliminary data on biometrical analysis for one humped camels and envisages a broader study with increased population and sample size.Keywords: camelus dromedarius, pathology, biometry, female genital tract
Procedia PDF Downloads 591148 Lennox-gastaut Syndrome Associated with Dysgenesis of Corpus Callosum
Authors: A. Bruce Janati, Muhammad Umair Khan, Naif Alghassab, Ibrahim Alzeir, Assem Mahmoud, M. Sammour
Abstract:
Rationale: Lennox-Gastaut syndrome(LGS) is an electro-clinical syndrome composed of the triad of mental retardation, multiple seizure types, and the characteristic generalized slow spike-wave complexes in the EEG. In this article, we report on two patients with LGS whose brain MRI showed dysgenesis of corpus callosum(CC). We review the literature and stress the role of CC in the genesis of secondary bilateral synchrony(SBS). Method: This was a clinical study conducted at King Khalid Hospital. Results: The EEG was consistent with LGS in patient 1 and unilateral slow spike-wave complexes in patient 2. The MRI showed hypoplasia of the splenium of CC in patient 1, and global hypoplasia of CC combined with Joubert syndrome in patient 2. Conclusion: Based on the data, we proffer the following hypotheses: 1-Hypoplasia of CC interferes with functional integrity of this structure. 2-The genu of CC plays a pivotal role in the genesis of secondary bilateral synchrony. 3-Electrodecremental seizures in LGS emanate from pacemakers generated in the brain stem, in particular the mesencephalon projecting abnormal signals to the cortex via thalamic nuclei. 4-Unilateral slow spike-wave complexes in the context of mental retardation and multiple seizure types may represent a variant of LGS, justifying neuroimaging studies.Keywords: EEG, Lennox-Gastaut syndrome, corpus callosum , MRI
Procedia PDF Downloads 445147 Vehicle to Vehicle Communication: Collision Avoidance Scenarios
Authors: Ahmed Emad, Ahmed Salah, Abdelrahman Magdy, Omar Rashid, Mohammed Adel
Abstract:
This research paper discusses vehicle-to-vehicle technology as an important application of linear algebra. This communication technology represents an efficient and promising application to help to ensure the safety of the drivers by warning them when a crash possibility is close. The major link that combines our topic with linear algebra is the Laplacian matrix. Some main definitions used in the V2V were illustrated, such as VANET and its characteristics. The V2V technology could be applied in different applications with different traffic scenarios and various ways to warn car drivers. These scenarios were simulated programs such as MATLAB and Python to test how the V2V system would respond to the different scenarios and warn the car drivers exposed to the threat of collisions.Keywords: V2V communication, vehicle to vehicle scenarios, VANET, FCW, EEBL, IMA, Laplacian matrix
Procedia PDF Downloads 162146 Effect of Weave Structure and Picking Sequence on the Comfort Properties of Woven Fabrics
Authors: Muhammad Umair, Tanveer Hussain, Khubab Shaker, Yasir Nawab, Muhammad Maqsood, Madeha Jabbar
Abstract:
The term comfort is defined as 'the absence of unpleasantness or discomfort' or 'a neutral state compared to the more active state'. Comfort mainly is of three types: sensorial (tactile) comfort, psychological comfort and thermo-physiological comfort. Thermophysiological comfort is determined by the air permeability and moisture management properties of the garment. The aim of this study was to investigate the effect of weave structure and picking sequence on the comfort properties of woven fabrics. Six woven fabrics with two different weave structures i.e. 1/1 plain and 3/1 twill and three different picking sequences: (SPI, DPI, 3PI) were taken as input variables whereas air permeability, wetting time, wicking behavior and overall moisture management capability (OMMC) of fabrics were taken as response variables and a comparison is made of the effect of weave structure and picking sequence on the response variables. It was found that fabrics woven in twill weave design and with simultaneous triple pick insertion (3PI) give significantly better air permeability, shorter wetting time and better water spreading rate, as compared to plain woven fabrics and those with double pick insertion (DPI) or single pick insertion (SPI). It could be concluded that the thermophysiological comfort of woven fabrics may be significantly improved simply by selecting a suitable weave design and picking sequence.Keywords: air permeability, picking sequence, thermophysiological comfort, weave design
Procedia PDF Downloads 418