Search results for: false self
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 370

Search results for: false self

100 International E-Learning for Assuring Ergonomic Working Conditions of Orthopaedic Surgeons: First Research Outcomes from Train4OrthoMIS

Authors: J. Bartnicka, J. A. Piedrabuena, R. Portilla, L. Moyano - Cuevas, J. B. Pagador, P. Augat, J. Tokarczyk, F. M. Sánchez Margallo

Abstract:

Orthopaedic surgeries are characterized by a high degree of complexity. This is reflected by four main groups of resources: 1) surgical team which is consisted of people with different competencies, educational backgrounds and positions; 2) information and knowledge about medical and technical aspects of surgery; 3) medical equipment including surgical tools and materials; 4) space infrastructure which is important from an operating room layout point of view. These all components must be integrated and build a homogeneous organism for achieving an efficient and ergonomically correct surgical workflow. Taking this as a background, there was formulated a concept of international project, called “Online Vocational Training course on ergonomics for orthopaedic Minimally Invasive” (Train4OrthoMIS), which aim is to develop an e-learning tool available in 4 languages (English, Spanish, Polish and German). In the article, there is presented the first project research outcomes focused on three aspects: 1) ergonomic needs of surgeons who work in hospitals around different European countries, 2) the concept of structure of e-learning course, 3) the definition of tools and methods for knowledge assessment adjusted to users’ expectation. The methodology was based on the expert panels and two types of surveys: 1) on training needs, 2) on evaluation and self-assessment preferences. The major findings of the study allowed describing the subjects of four training modules and learning sessions. According to peoples’ opinion there were defined most expected test methods which are single choice test and right after quizzes: “True or False” and “Link elements”. The first project outcomes confirmed the necessity of creating a universal training tool for orthopaedic surgeons regardless of the country in which they work. Because of limited time that surgeons have, the e-learning course should be strictly adjusted to their expectation in order to be useful.

Keywords: international e-learning, ergonomics, orthopaedic surgery, Train4OrthoMIS

Procedia PDF Downloads 145
99 Management of Recurrent Temporomandibular Joint True Bony Ankylosis : A Case Report

Authors: Mahmoud A. Amin, Essam Taman, Ahmed Omran, Mahmoud Shawky, Ahmed Mekawy, Abdallah M. Kotkat, Saber Younes, Nehad N. Ghonemy, Amin Saad, Ezz-Aleslam, Abdullah M. Elosh

Abstract:

Introduction: TMJ is a one-of-a-kind, complicated synovial joint that helps with masticatory function by allowing the mandible to open and close the mouth. True ankylosis is a situation in which condylar movement is limited by a mechanical defect in the joint, whereas false ankylosis is a condition in which there is a restriction in mandibular movement due to muscular spasm myositis ossificans, and coronoid process hyperplasia. Ankylosis is characterized by the inability to open the mouth due to fusion of the TMJ condyle to the base of the skull as a result of trauma, infection, or systemic diseases such as rheumatoid arthritis (the most common) and psoraisis. Ankylosis causes facial asymmetry and affects the patient psychologically as well as speech, difficult mastication, poor oral hygiene, malocclusion, and other factors. TMJ is a technically challenging joint; hence TMJ ankylosis management is complicated. Case presentation: this case is a male patient 25 years old reported to our maxillofacial clinic in Damietta faculty of medicine, Al-Azhar University with the inability to open the mouth at all, with a history of difficulty of mouth breathing and eating foods, there was a history of falling from height at 2006, and the patient underwent corrective surgery before with no improvement because the ankylosis was relapsed short period after the previous operations with that done out of our hospital inter-incisor distant ZERO so, this condition need mandatory management. Clinical examination and radiological investigations were done after complete approval from the patient and his brother; tracheostomy was done for our patient before the operation. The patient entered the operation in our hospital and drastic improvement in mouth opening was noticed, helping to restore the physical psychological health of the patient.

Keywords: temporomandibular joint, TMJ, Ankylosis, mouth opening, physiotherapy, condylar plate

Procedia PDF Downloads 112
98 Effect of Smartphone Applications on Patients' Knowledge of Surgery-Related Adverse Events during Hospitalization

Authors: Eunjoo Lee

Abstract:

Background: As the number of surgeries increases, the incidence of adverse events is likely to become more prevalent. Patients who are somewhat knowledgeable about surgery-related adverse events are more likely to engage in safety initiatives to prevent them. Objectives: To evaluate the impact of a smartphone application developed during the study to enhance patients’ knowledge of surgery-related adverse events during hospitalization. Design: Non-randomized, one group, measured pre- and post-intervention. Participants: Thirty-six hospitalized patients admitted to the orthopedics unit of a general hospital in South Korea. Methods. First, a smartphone application to enhance patients’ knowledge of surgery-related adverse events was developed through an iterative process, which included a literature review, expert consultation, and pilot testing. The application was installed on participants’ smartphones, and research assistants taught the participants to use it. Twenty-five true/false questions were used to assess patients’ knowledge of preoperative precautions (eight items), surgical site infection (five items), Foley catheter management (four items), drainage management (four items), and anesthesia-related complications (four items). Results: Overall, the percentage of correct answers increased significantly, from 57.02% to 73.82%, although answers related to a few specific topics did not increase that much. Although the patients’ understanding of drainage management and the Foley catheter did increase substantially after they used the smartphone application, it was still relatively low. Conclusions: The smartphone application developed during this study enhanced the patients’ knowledge of surgery-related adverse events during hospitalization. However, nurses must make an additional effort to help patients to understand certain topics, including drainage and Foley catheter management. Relevance to clinical practice: Insufficient patient knowledge increases the risk of adverse events during hospitalization. Nurses should take active steps to enhance patients’ knowledge of a range of safety issues during hospitalization, in order to decrease the number of surgery-related adverse events.

Keywords: patient education, patient participation, patient safety, smartphone application, surgical errors

Procedia PDF Downloads 210
97 Comparison of Receiver Operating Characteristic Curve Smoothing Methods

Authors: D. Sigirli

Abstract:

The Receiver Operating Characteristic (ROC) curve is a commonly used statistical tool for evaluating the diagnostic performance of screening and diagnostic test with continuous or ordinal scale results which aims to predict the presence or absence probability of a condition, usually a disease. When the test results were measured as numeric values, sensitivity and specificity can be computed across all possible threshold values which discriminate the subjects as diseased and non-diseased. There are infinite numbers of possible decision thresholds along the continuum of the test results. The ROC curve presents the trade-off between sensitivity and the 1-specificity as the threshold changes. The empirical ROC curve which is a non-parametric estimator of the ROC curve is robust and it represents data accurately. However, especially for small sample sizes, it has a problem of variability and as it is a step function there can be different false positive rates for a true positive rate value and vice versa. Besides, the estimated ROC curve being in a jagged form, since the true ROC curve is a smooth curve, it underestimates the true ROC curve. Since the true ROC curve is assumed to be smooth, several smoothing methods have been explored to smooth a ROC curve. These include using kernel estimates, using log-concave densities, to fit parameters for the specified density function to the data with the maximum-likelihood fitting of univariate distributions or to create a probability distribution by fitting the specified distribution to the data nd using smooth versions of the empirical distribution functions. In the present paper, we aimed to propose a smooth ROC curve estimation based on the boundary corrected kernel function and to compare the performances of ROC curve smoothing methods for the diagnostic test results coming from different distributions in different sample sizes. We performed simulation study to compare the performances of different methods for different scenarios with 1000 repetitions. It is seen that the performance of the proposed method was typically better than that of the empirical ROC curve and only slightly worse compared to the binormal model when in fact the underlying samples were generated from the normal distribution.

Keywords: empirical estimator, kernel function, smoothing, receiver operating characteristic curve

Procedia PDF Downloads 112
96 Training a Neural Network to Segment, Detect and Recognize Numbers

Authors: Abhisek Dash

Abstract:

This study had three neural networks, one for number segmentation, one for number detection and one for number recognition all of which are coupled to one another. All networks were trained on the MNIST dataset and were convolutional. It was assumed that the images had lighter background and darker foreground. The segmentation network took 28x28 images as input and had sixteen outputs. Segmentation training starts when a dark pixel is encountered. Taking a window(7x7) over that pixel as focus, the eight neighborhood of the focus was checked for further dark pixels. The segmentation network was then trained to move in those directions which had dark pixels. To this end the segmentation network had 16 outputs. They were arranged as “go east”, ”don’t go east ”, “go south east”, “don’t go south east”, “go south”, “don’t go south” and so on w.r.t focus window. The focus window was resized into a 28x28 image and the network was trained to consider those neighborhoods which had dark pixels. The neighborhoods which had dark pixels were pushed into a queue in a particular order. The neighborhoods were then popped one at a time stitched to the existing partial image of the number one at a time and trained on which neighborhoods to consider when the new partial image was presented. The above process was repeated until the image was fully covered by the 7x7 neighborhoods and there were no more uncovered black pixels. During testing the network scans and looks for the first dark pixel. From here on the network predicts which neighborhoods to consider and segments the image. After this step the group of neighborhoods are passed into the detection network. The detection network took 28x28 images as input and had two outputs denoting whether a number was detected or not. Since the ground truth of the bounds of a number was known during training the detection network outputted in favor of number not found until the bounds were not met and vice versa. The recognition network was a standard CNN that also took 28x28 images and had 10 outputs for recognition of numbers from 0 to 9. This network was activated only when the detection network votes in favor of number detected. The above methodology could segment connected and overlapping numbers. Additionally the recognition unit was only invoked when a number was detected which minimized false positives. It also eliminated the need for rules of thumb as segmentation is learned. The strategy can also be extended to other characters as well.

Keywords: convolutional neural networks, OCR, text detection, text segmentation

Procedia PDF Downloads 120
95 Influence of Climate Change on Landslides in Northeast India: A Case Study

Authors: G. Vishnu, T. V. Bharat

Abstract:

Rainfall plays a major role in the stability of natural slopes in tropical and subtropical regions. These slopes usually have high slope angles and are stable during the dry season. The critical rainfall intensity that might trigger a landslide may not be the highest rainfall. In addition to geological discontinuities and anthropogenic factors, water content, suction, and hydraulic conductivity also play a role. A thorough geotechnical investigation with the principles of unsaturated soil mechanics is required to predict the failures in these cases. The study discusses three landslide events that had occurred in residual hills of Guwahati, India. Rainfall data analysis, history image analysis, land use, and slope maps of the region were analyzed and discussed. The landslide occurred on June (24, 26, and 28) 2020, on the respective sites, but the highest rainfall was on June (6 and 17) 2020. The factors that lead to the landslide occurrence is the combination of critical events initiated with rainfall, causing a reduction in suction. The sites consist of a mixture of rocks and soil. The slope failure occurs due to the saturation of the soil layer leading to loss of soil strength resulting in the flow of the entire soil rock mass. The land-use change, construction activities, other human and natural activities that lead to faster disintegration of rock mass may accelerate the landslide events. Landslides in these slopes are inevitable, and the development of an early warning system (EWS) to save human lives and resources is a feasible way. The actual time of failure of a slope can be better predicted by considering all these factors rather than depending solely on the rainfall intensities. An effective EWS is required with less false alarms in these regions by proper instrumentation of slope and appropriate climatic downscaling.

Keywords: early warning system, historic image analysis, slope instrumentation, unsaturated soil mechanics

Procedia PDF Downloads 73
94 Re-Thinking and Practicing Critical Pedagogy in Education through Art

Authors: Dalya Markovich

Abstract:

In the last decade art-educators strive to integrate critical pedagogy within the art classroom. Critical pedagogy aims to deconstruct the oppressive social reality and the false consciousness in which learners from both privileged and underprivileged groups are caught. Understanding oppression as a product of socio-political conditions seeks to instigate processes of change anchored in the student's views. Yet, growing empirical evidence show that these efforts often has resulted in art projects in which art teachers play an active role in the process of critical teaching, while the students remain passive listeners. In this common scenario, the teachers/artists become authoritarian moral guides of critical thinking and acting, while the students are often found to be indifferent or play along to satisfy the teachers'/artists aspirations. These responses indicate that the message of critical pedagogy – transforming the students' way of thinking and acting – mostly do not fulfill its emancipation goals. The study analyses the critical praxis embedded in new art projects and their influence on the participants. This type of projects replaces the individual producer with a collaborative work; switch the finite work with an ongoing project; and transforms the passive learner to an engaged co-producer. The research delves into the pedagogical framework of two of these art projects by using qualitative methods. In-depth interviews were conducted with 4 of the projects' initiator and managers, in order to access understandings of the art projects goals and pedagogical methods. Field work included 4 participant observation (two in each project) during social encounters in the project's settings, focusing on how critical thinking is enacted (or not) by the participants. The analysis exposes how the new art projects avoid the prepackaged "critical" assumptions and praxis, thus turning the participants from passive carriers of critical thinking to agents that actively use criticism. Findings invite researchers to explore new avenues for understanding critical pedagogy and developing various ways to implement critical pedagogy during art education, in view of the growing need of critical thinking and acting in school/society.

Keywords: critical pedagogy, education through art, collaborative work, agency

Procedia PDF Downloads 104
93 The Consequence of Being Perceived as An 'Immodest Woman': The Kuwaiti Criminal Justice System’s Response to Allegations of Sexual Violence

Authors: Eiman Alqattan

Abstract:

Kuwaiti criminal justice system’s responses to allegations of sexual violence against women during the pre-trial process, suggesting that the system in Kuwait is affected by an ethos that is male dominated and patriarchal, and which results in prejudicial, unfair, and unequal treatment of female victims of serious sexual offenses. Data derived from qualitative semi-structured face-to-face interviews with four main groups of criminal justice system personnel in Kuwait (prosecutors, police investigators, police officers, and investigators) reveal the characteristics of a complaint of sexual violence that contribute to cases being either sent to court or dismissed. This proposed paper will suggest that Arab cultural views of women appear to influence and even shape the views, perceptions, and conduct of the interviewed Kuwaiti criminal justice system personnel regarding complaints of sexual violence made by citizens. Data from the interviews show how the image of the ‘modest woman’ that exists within Arabic cultural views and norms greatly contributes to shaping the characteristics of what the majority of the interviewed officials considered to be a ‘credible’ allegation of sexual violence. In addition, it is clear that the interviewees’ definitions of ‘modesty’ varied. Yet the problem is not only about the stereotypical perceptions of complainants or the consequences of those perceptions on the decision to send the case to court. These perceptions also affected the behaviours of criminal justice system personnel towards citizen complainants. When complainants’ allegations were questioned, investigators went as far as abusing the women verbally or physically, often in order to force them to withdraw the so-called ‘false’ complaint in order to protect the ‘real’ victim: the ‘innocent defendant’. The proposed presentation will discuss these police approaches to women and the techniques used in assessing the credibility of their accusations, including how they differ depending on whether the complainant was under or over 21 years old.

Keywords: criminal justice system, law and Arab culture, modest woman, sexual violence

Procedia PDF Downloads 264
92 Between Buddha and Tsar: Kalmyk Buddhist Sangha in Late Russian Empire

Authors: Elzyata Kuberlinova

Abstract:

This study explores how the Kalmyk Buddhist sangha responded to the Russian empire’s administrative integration and how the Buddhist clerical institutions were shaped in the process of interaction with representatives of the predominantly Orthodox state. The eighteenth-nineteenth century Russian imperial regime adhered to a religion-centred framework to govern its diverse subjects. Within this framework, any form of religious authority was considered a useful tool in the imperial quest for legibility. As such, rather than imposing religious homogeneity, the Russian administration engineered a framework of religious toleration and integrated the non-Orthodox clerical institutions in the empire’s administration. In its attempt to govern the large body of Kalmyk Buddhist sangha, the Russian government had to incorporate the sangha into the imperial institutional establishment. To this end, the Russian government founded the Lamaist Spiritual Governing Board in 1834, which became a part of the civil administration, where the Kalmyk Buddhist affairs were managed under the supervision of the Russian secular authorities. In 1847 the Lamaist Spiritual Board was abolished and Buddhist religious authority was transferred to the Lama of the Kalmyk people. From 1847 until the end of the empire in 1917 the Lama was the manager and intermediary figure between the Russian authorities and the Kalmyks where religious affairs were concerned. Substantial evidence collected in archives in Elista, Astrakhan, Stavropol and St.Petersburg show that despite being on the government’s payroll, first the Lamaist Spiritual Governing Board and later on the Lama did not always serve the interests of the state, and did not always comply with the Russian authorities’ orders. Although being incorporated into the state administrative system the Lama often found ways to manoeuvre the web of the Russian imperial bureaucracy in order to achieve his own goals. The Lama often used ‘every-day forms of resistance’ such as feigned misinterpretation, evasion, false compliance, feigned ignorance, and sabotage in order to resist without directly confronting or challenging the state orders.

Keywords: Buddhist Sangha, intermediary, Kalmyks, Lama, legibility, resistance, reform, Russian empire

Procedia PDF Downloads 182
91 Cross Reactivity of Risperidone in Fentanyl Point of Care Devices

Authors: Barry D. Kyle, Jessica Boyd, Robin Pickersgill, Nicole Squires, Cynthia Balion

Abstract:

Background-Aim: Fentanyl is a highly-potent synthetic μ-opioid receptor agonist used for exceptional pain management. Its main metabolite, norfentanyl, is typically present in urine at significantly high concentrations (i.e. ~20%) representing an effective targeting molecule for immunoassay detection. Here, we evaluated the NCSTM One Step Fentanyl Test Device© and the BTNX Rapid ResponseTM Single Drug Test Strip© point of care (POC) test strips targeting norfentanyl (20 ng/ml) and fentanyl (100 ng/ml) molecules for potential risperidone interference. Methods: POC tests calibrated against norfentanyl (20 ng/ml) used [immunochromatographic] lateral flow devices to provide qualitative results within five minutes of urine sample contact. Results were recorded as negative if lines appeared in the test and control regions according to manufacturer’s instructions. Positive results were recorded if no line appeared in the test region (i.e., control line only visible). Pooled patient urine (n=20), that screened negative for drugs of abuse (using NCS One Step Multi-Line Screen) and fentanyl (using BTNX Rapid Response Strip) was used for spiking studies. Urine was spiked with risperidone alone and with combinations of fentanyl, norfentanyl and/or risperidone to evaluate cross-reactivity in each test device. Results: A positive screen result was obtained when 8,000 ng/mL of risperidone was spiked into drug free urine using the NCS test device. Positive screen results were also obtained in spiked urine samples containing fentanyl and norfentanyl combinations below the cut-off concentrations when 4000 ng/mL risperidone was present using the NCS testing device. There were no screen positive test results using the BTNX test strip with up to 8,000 ng/mL alone or in combination with concentrations of fentanyl and norfentanyl below the cut-off. Both devices screened positive when either fentanyl or norfentanyl exceeded the cut-off threshold in the absence and presence of risperidone. Conclusion: We report that urine samples containing risperidone may give a false positive result using the NCS One Step Fentanyl Test Device.

Keywords: fentanyl, interferences, point of care test, Risperidone

Procedia PDF Downloads 220
90 The Ecosystem of Food Allergy Clinical Trials: A Systematic Review

Authors: Eimar Yadir Quintero Tapias

Abstract:

Background: Science is not generally self-correcting; many clinical studies end with the same conclusion "more research is needed." This study hypothesizes that first, we need a better appraisal of the available (and unavailable) evidence instead of creating more of the same false inquiries. Methods: Systematic review of ClinicalTrials.gov study records using the following Boolean operators: (food OR nut OR milk OR egg OR shellfish OR wheat OR peanuts) AND (allergy OR allergies OR hypersensitivity OR hypersensitivities). Variables included the status of the study (e g., active and completed), availability of results, sponsor type, sample size, among others. To determine the rates of non-publication in journals indexed by PubMed, an advanced search query using the specific Number of Clinical Trials (e.g., NCT000001 OR NCT000002 OR...) was performed. As a prophylactic measure to prevent P-hacking, data analyses only included descriptive statistics and not inferential approaches. Results: A total of 2092 study records matched the search query described above (date: September 13, 2019). Most studies were interventional (n = 1770; 84.6%) and the remainder observational (n = 322; 15.4%). Universities, hospitals, and research centers sponsored over half of these investigations (n = 1208; 57.7%), 308 studies (14.7%) were industry-funded, and 147 received NIH grants; the remaining studies got mixed sponsorship. Regarding completed studies (n = 1156; 55.2%), 248 (21.5%) have results available at the registry site, and 417 (36.1%) matched NCT numbers of journal papers indexed by PubMed. Conclusions: The internal and external validity of human research is critical for the appraisal of medical evidence. It is imperative to analyze the entire dataset of clinical studies, preferably at a patient-level anonymized raw data, before rushing to conclusions with insufficient and inadequate information. Publication bias and non-registration of clinical trials limit the evaluation of the evidence concerning therapeutic interventions for food allergy, such as oral and sublingual immunotherapy, as well as any other medical condition. Over half of the food allergy human research remains unpublished.

Keywords: allergy, clinical trials, immunology, systematic reviews

Procedia PDF Downloads 100
89 Importance of Detecting Malingering Patients in Clinical Setting

Authors: Sakshi Chopra, Harsimarpreet Kaur, Ashima Nehra

Abstract:

Objectives: Malingering is fabricating or exaggerating the symptoms of mental or physical disorders for a variety of secondary gains or motives, which may include financial compensation; avoiding work; getting lighter criminal sentences; or simply to attract attention or sympathy. Malingering is different from somatization disorder and factitious disorder. The prevalence of malingering is unknown and difficult to determine. In an estimated study in forensic population, it can reach up to 17% cases. But the accuracy of such estimates is questionable as successful malingerers are not detected and thus, not included. Methods: The case study of a 58 years old, right handed, graduate, pre-morbidly working in a national company with reported history of stroke leading to head injury; cerebral infarction/facial palsy and dementia. He was referred for disability certification so that his job position can be transferred to his son as he could not work anymore. A series of Neuropsychological tests were administered. Results: With a mental age of < 2.5 years; social adaptive functioning was overall < 20 showing profound Mental Retardation, less than 1 year social age in abilities of self-help, eating, dressing, locomotion, occupation, communication, self-direction, and socialization; severely impaired verbal and performance ability, 96% impairment in Activities of Daily Living, with an indication of very severe depression. With inconsistent and fluctuating medical findings and problem descriptions to different health professionals forming the board for his disability, it was concluded that this patient was malingering. Conclusions: Even though it can be easily defined, malingering can be very challenging to diagnosis. Cases of malingering impose a substantial economic burden on the health care system and false attribution of malingering imposes a substantial burden of suffering on a significant proportion of the patient population. Timely, tactful diagnosis and management can help ease this patient burden on the healthcare system. Malingering can be detected by only trained mental health professionals in the clinical setting.

Keywords: disability, India, malingering, neuropsychological assessment

Procedia PDF Downloads 384
88 A Study on Awareness and Attitude of First-Year Medical Students on Epilepsy in University of Khartoum 2020-2021

Authors: Mohammed E. Ibrahim, Baraa A. Taha, Kamil M. A. Shabban

Abstract:

Background: Epilepsy is a common but widely misunderstood illness. Consequently, patients with epilepsy suffer from considerable stigmatization in society. This social stigma and discrimination often cause more suffering for the patients than the disease itself. Since very few studies have explored the misperceptions about epilepsy among university students in Sudan, it is not possible to provide focused intervention aimed at eliminating this discrimination. Methods: A cross-sectional study was applied among the first-year medical students at the University of Khartoum between December (2020) and February (2021). A 29-item standardized questionnaire was self-administered by 198 students (out of 320) who agreed to participate in this study. Google form was the tool used to collect the data. The data were analyzed using the Statistical Package for Social Science software version 26. Result: Overall, the results indicate a negative trend in knowledge and attitude toward epilepsy. The vast majority of the respondents (84.8%) have read or heard about epilepsy, while 43.9% had seen someone with epilepsy. Only 7.5% of the participants reported that epilepsy is contagious, whereas 43.4% of them think that epilepsy is a psychological disorder. About 62.2% of students think head/birth trauma is a cause of epilepsy. On the other side, about 15.7% and 5.1% believed that evil spirits and punishment from god can also be a possible cause of epilepsy; we found these false beliefs are more common in participants from rural areas (p-value < 0.05). In regard to attitude, 19.7% of students thought that it is inappropriate for a patient with epilepsy to have a child. This attitude correlates with the mother’s education as the percentage is higher for those who have lower mother’s education (through secondary school education and below) (p < 0.05). The majority of Our participant knew that some people with epilepsy need life-long drug treatment; this belief was found to be more common in females than their counterparts(p < 0.05). . Finally, most of the respondents (93.9%) thought that a child with epilepsy Can be successful in a normal class. This belief is four-time as common in participants whose mothers have higher education (through university education and above) compared with corresponding respondents (p < 0.05). Conclusion: This study concludes that students' knowledge about epilepsy is limited and requires immediate intervention through educational campaigns to develop a well-informed and tolerant community.

Keywords: epilepsy, awareness, attitude, university students, Sudan

Procedia PDF Downloads 92
87 The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention

Authors: László Schmidt

Abstract:

Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions.

Keywords: cybercrime, COVID-19, Hungary, criminal law

Procedia PDF Downloads 25
86 Transcriptomics Analysis on Comparing Non-Small Cell Lung Cancer versus Normal Lung, and Early Stage Compared versus Late-Stages of Non-Small Cell Lung Cancer

Authors: Achitphol Chookaew, Paramee Thongsukhsai, Patamarerk Engsontia, Narongwit Nakwan, Pritsana Raugrut

Abstract:

Lung cancer is one of the most common malignancies and primary cause of death due to cancer worldwide. Non-small cell lung cancer (NSCLC) is the main subtype in which majority of patients present with advanced-stage disease. Herein, we analyzed differentially expressed genes to find potential biomarkers for lung cancer diagnosis as well as prognostic markers. We used transcriptome data from our 2 NSCLC patients and public data (GSE81089) composing of 8 NSCLC and 10 normal lung tissues. Differentially expressed genes (DEGs) between NSCLC and normal tissue and between early-stage and late-stage NSCLC were analyzed by the DESeq2. Pairwise correlation was used to find the DEGs with false discovery rate (FDR) adjusted p-value £ 0.05 and |log2 fold change| ³ 4 for NSCLC versus normal and FDR adjusted p-value £ 0.05 with |log2 fold change| ³ 2 for early versus late-stage NSCLC. Bioinformatic tools were used for functional and pathway analysis. Moreover, the top ten genes in each comparison group were verified the expression and survival analysis via GEPIA. We found 150 up-regulated and 45 down-regulated genes in NSCLC compared to normal tissues. Many immnunoglobulin-related genes e.g., IGHV4-4, IGHV5-10-1, IGHV4-31, IGHV4-61, and IGHV1-69D were significantly up-regulated. 22 genes were up-regulated, and five genes were down-regulated in late-stage compared to early-stage NSCLC. The top five DEGs genes were KRT6B, SPRR1A, KRT13, KRT6A and KRT5. Keratin 6B (KRT6B) was the most significantly increased gene in the late-stage NSCLC. From GEPIA analysis, we concluded that IGHV4-31 and IGKV1-9 might be used as diagnostic biomarkers, while KRT6B and KRT6A might be used as prognostic biomarkers. However, further clinical validation is needed.

Keywords: differentially expressed genes, early and late-stages, gene ontology, non-small cell lung cancer transcriptomics

Procedia PDF Downloads 70
85 The Portuguese Legal Instruments to Combat the Improper Use of the Contract Service

Authors: Ana Lambelho

Abstract:

Nowadays is very common that an activity may be performed independently or dependently. In Portugal, the Labour Law exclusively protects the dependent labour relations. The independent work is regulated by civil law, where the autonomy of the will is the main principle. For companies is more advantageous to hire people under a service agreement since, in that case, the relation is not submitted to the limits established in Labour law and collective bargaining. This practice has nothing wrong, if the performance of work is, in fact, made autonomously. The problem is the increased frequency of the celebration of service agreements to hide a legal relation of subordination. Aware of this and regarding the huge difficulty to demonstrate the existence of subordinated work (that often runs against the employee), the Portuguese legislator devoted some legislative rules in order to facilitate the evidence of legal subordination and, on the other hand, to avoid the misuse of the provision of service agreements. This study focuses precisely on the analysis of this solution, namely the so-called presumption of ‘laboralidade’ and on the lawsuit to recognize the existence of a labour contract. The presumption of the existence of a labour contract is present in the Portuguese legal system since 2003, and received, with the 2009 Labour Code, a new redaction that, according to the doctrine and the jurisprudence, finally approached it to a legal presumption, with the consequent reversal of the burden of proof and, in consequence, made easier to proof the legal subordination, because the employee will just have to plead and prove the existence of two of the elements described in the law to use this presumption. Another change in the Portuguese legal framework is related with the competencies of the Authority for Working Conditions (AWC): now, if during an inspection, the Authority finds a situation that seems to be an undeclared employment situation, it may access the company and, if it does not regularize voluntarily the situation, AWC has a duty to communicate to the public prosecutor, who will begin the lawsuit for the recognition of the existence of an employment contract. To defend the public interest, the action to recognize the existence of an employment contract will follow its terms, even against the employee will. Although the existence of these mechanisms does not solve by itself the problem of evasion of labour law and false ‘green receipts’, it is undeniable that it is an important step in combating fraud in this field.

Keywords: independent work, labour contract, Portugal, service agreement

Procedia PDF Downloads 291
84 Damage Detection in a Cantilever Beam under Different Excitation and Temperature Conditions

Authors: A. Kyprianou, A. Tjirkallis

Abstract:

Condition monitoring of structures in service is very important as it provides information about the risk of damage development. One of the essential constituents of structural condition monitoring is the damage detection methodology. In the context of condition monitoring of in service structures a damage detection methodology analyses data obtained from the structure while it is in operation. Usually, this means that the data could be affected by operational and environmental conditions in a way that could mask the effects of a possible damage on the data. This, depending on the damage detection methodology, could lead to either false alarms or miss existing damages. In this article a damage detection methodology that is based on the Spatio-temporal continuous wavelet transform (SPT-CWT) analysis of a sequence of experimental time responses of a cantilever beam is proposed. The cantilever is subjected to white and pink noise excitation to simulate different operating conditions. In addition, in order to simulate changing environmental conditions, the cantilever is subjected to heating by a heat gun. The response of the cantilever beam is measured by a high-speed camera. Edges are extracted from the series of images of the beam response captured by the camera. Subsequent processing of the edges gives a series of time responses on 439 points on the beam. This sequence is then analyzed using the SPT-CWT to identify damage. The algorithm proposed was able to clearly identify damage under any condition when the structure was excited by white noise force. In addition, in the case of white noise excitation, the analysis could also reveal the position of the heat gun when it was used to heat the structure. The analysis could identify the different operating conditions i.e. between responses due to white noise excitation and responses due to pink noise excitation. During the pink noise excitation whereas damage and changing temperature were identified it was not possible to clearly identify the effect of damage from that of temperature. The methodology proposed in this article for damage detection enables the separation the damage effect from that due to temperature and excitation on data obtained from measurements of a cantilever beam. This methodology does not require information about the apriori state of the structure.

Keywords: spatiotemporal continuous wavelet transform, damage detection, data normalization, varying temperature

Procedia PDF Downloads 248
83 The Challenges of Digital Crime Nowadays

Authors: Bendes Ákos

Abstract:

Digital evidence will be the most widely used type of evidence in the future. With the development of the modern world, more and more new types of crimes have evolved and transformed. For this reason, it is extremely important to examine these types of crimes in order to get a comprehensive picture of them, with which we can help the authorities work. In 1865, with early technologies, people were able to forge a picture of a quality that is not even recognized today. With the help of today's technology, authorities receive a lot of false evidence. Officials are not able to process such a large amount of data, nor do they have the necessary technical knowledge to get a real picture of the authenticity of the given evidence. The digital world has many dangers. Unfortunately, we live in an age where we must protect everything digitally: our phones, our computers, our cars, and all the smart devices that are present in our personal lives and this is not only a burden on us, since companies, state and public utilities institutions are also forced to do so. The training of specialists and experts is essential so that the authorities can manage the incoming digital evidence at some level. When analyzing evidence, it is important to be able to examine it from the moment it is created. Establishing authenticity is a very important issue during official procedures. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. Otherwise, they will not have sufficient probative value and in case of doubt, the court will always decide in favor of the defendant. One of the most common problems in the world of digital data and evidence is doubt, which is why it is extremely important to examine the above-mentioned problems. The most effective way to avoid digital crimes is to prevent them, for which proper education and knowledge are essential. The aim is to present the dangers inherent in the digital world and the new types of digital crimes. After the comparison of the Hungarian investigative techniques with international practice, modernizing proposals will be given. A sufficiently stable yet flexible legislation is needed that can monitor the rapid changes in the world and not regulate afterward but rather provide an appropriate framework. It is also important to be able to distinguish between digital and digitalized evidence, as the degree of probative force differs greatly. The aim of the research is to promote effective international cooperation and uniform legal regulation in the world of digital crimes.

Keywords: digital crime, digital law, cyber crime, international cooperation, new crimes, skepticism

Procedia PDF Downloads 26
82 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.

Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry

Procedia PDF Downloads 38
81 Safety-critical Alarming Strategy Based on Statistically Defined Slope Deformation Behaviour Model Case Study: Upright-dipping Highwall in a Coal Mining Area

Authors: Lintang Putra Sadewa, Ilham Prasetya Budhi

Abstract:

Slope monitoring program has now become a mandatory campaign for any open pit mines around the world to operate safely. Utilizing various slope monitoring instruments and strategies, miners are now able to deliver precise decisions in mitigating the risk of slope failures which can be catastrophic. Currently, the most sophisticated slope monitoring technology available is the Slope Stability Radar (SSR), whichcan measure wall deformation in submillimeter accuracy. One of its eminent features is that SSRcan provide a timely warning by automatically raise an alarm when a predetermined rate-of-movement threshold is reached. However, establishing proper alarm thresholds is arguably one of the onerous challenges faced in any slope monitoring program. The difficulty mainly lies in the number of considerations that must be taken when generating a threshold becausean alarm must be effectivethat it should limit the occurrences of false alarms while alsobeing able to capture any real wall deformations. In this sense, experience shows that a site-specific alarm thresholdtendsto produce more reliable results because it considers site distinctive variables. This study will attempt to determinealarming thresholds for safety-critical monitoring based on an empirical model of slope deformation behaviour that is defined statistically fromdeformation data captured by the Slope Stability Radar (SSR). The study area comprises of upright-dipping highwall setting in a coal mining area with intense mining activities, andthe deformation data used for the study were recorded by the SSR throughout the year 2022. The model is site-specific in nature thus, valuable information extracted from the model (e.g., time-to-failure, onset-of-acceleration, and velocity) will be applicable in setting up site-specific alarm thresholds and will give a clear understanding of how deformation trends evolve over the area.

Keywords: safety-critical monitoring, alarming strategy, slope deformation behaviour model, coal mining

Procedia PDF Downloads 47
80 Reconceptualizing Human Trafficking: Revealings of the Experience of Ethiopian Migrant Returnees

Authors: Waganesh Zeleke, Abebaw Minaye

Abstract:

This study examined the act, means, and purpose of human trafficking in the case of Ethiopian migrant returnees from the Middle East and South Africa. Using a questionnaire survey data was gathered from 1078 returnees. Twelve focus group discussions were used to solicit detailed experience of returnee about the process of their 'unsafe' immigration. Both quantitative and qualitative analysis results revealed that against the mainstream thinking of human trafficking means such as forcing, coercing, abducting or threatening, traffickers used 'victims’ free will' means by providing false promises to and capitalizing on the vulnerability of migrants. The migrants’ living condition including unemployment, ambitious view to change their life, and low level of risk perception were found to be risk factors which made them vulnerable and target of the brokers and smugglers who served as a catalyst in the process of their 'unsafe' migration. Equal to the traffickers/brokers/agency, the migrants’ family, friends and Ethiopian embassies contributed to the deplorable situation of migrant workers. 64.4% of the returnees reported that their migration is self-initiated, and 20% reported peer pressure and 13.8 percent reported family pressure, and it is only 1.8% who reported having been pushed by brokers. The findings revealed that 69.5% of the returnees do not know about the lifestyle and culture of the host community before their leave. In a similar vein, 50.9% of the returnees reported that they do not know about the nature of the work they are to do and their responsibilities. Further, 81% of the returnees indicated that the pre-migration training they received was not enough in equipping them with the required skill. Despite the returnees experiences of various forms of abuse and exploitation in the journey and at the destination they still have a positive attitude for migration (t=9.7 mean of 18.85 with a test value of 15). The returnees evaluated the support provided by sending agencies and Ethiopian embassies in the destination to be poor. 51.8% of the migrants do not know the details of the contract they signed during migration. Close to 70% of the returnees expressed that they had not got any legal support from stakeholders when they faced problems. What is more is that despite all these 27.9% of the returnees indicated re-immigrating as their plan. Based on these findings on the context and experience of Ethiopian migrant returnees, implications for training, policy, research, and intervention are discussed.

Keywords: trafficking, migrant, returnee, Ethiopia, experience, reconceptualizing

Procedia PDF Downloads 275
79 Maize Farmers’ Perception of Sharp Practices among Agro-Input Dealers in Ibadan/Ibarapa Agricultural Zone, Oyo State

Authors: Ademola A. Ladele, Peace I. Aburime

Abstract:

Fake and substandard agricultural inputs pose a serious stumbling block to farm productivity and subsequently improved livelihood. There is, therefore, a need to pave ways for sustainable agriculture and self-sufficiency in food production by proffering solutions to this challenge. Maize farmers' perception of sharp practices among agro-input dealers in Ibadan/Ibarapa agricultural zone in Oyo state was therefore investigated. A multi-stage random sampling technique was used to select registered maize farmers in the Ibadan/Ibarapa agricultural zone of the Oyo State Agricultural Development Programme (OYSADEP). A structured questionnaire was used to collect information on the perception of sharp practices and the effects of sharp practices. A total of seventy-five maize farmers were interviewed. A focus group discussion was organized to identify ways of curbing sharp practices to complement the survey. Data were analyzed using descriptive statistics, Chi-square, and Pearson Product Moment Correlation (PPMC). Forms of sharp practices indicated were sales of expired fertilizers, expired pesticides, expired herbicides, underweight fertilizers, adulterated fertilizers, adulterated herbicides, packs containing broken seeds, infested seeds, lack of truth in labeling/wrong labels, manipulation of measuring scales, and false declaration of hecterages covered by tractor operators. The majority had unfavorable perception of agro-input dealers on sharp practices. A significant relationship was observed between respondents’ level of education and their perception of sharp practices. There were no significant relationships between respondents’ sex, marital status and religion, and their perception of sharp practices. A significant correlation exists between the forms of sharp practices and the perceived effect on agricultural production. It is concluded that the perceived effect of sharp practices was critical and the endemic culture of sharp practices prevailed in agro-input in Ibadan/Ibarapa agricultural zone. A standard regulatory system that will certify and monitor the quality of inputs should be put in place.

Keywords: agricultural productivity, agro-input dealers, maize farmers, sharp practices

Procedia PDF Downloads 156
78 Improve Divers Tracking and Classification in Sonar Images Using Robust Diver Wake Detection Algorithm

Authors: Mohammad Tarek Al Muallim, Ozhan Duzenli, Ceyhun Ilguy

Abstract:

Harbor protection systems are so important. The need for automatic protection systems has increased over the last years. Diver detection active sonar has great significance. It used to detect underwater threats such as divers and autonomous underwater vehicle. To automatically detect such threats the sonar image is processed by algorithms. These algorithms used to detect, track and classify of underwater objects. In this work, divers tracking and classification algorithm is improved be proposing a robust wake detection method. To detect objects the sonar images is normalized then segmented based on fixed threshold. Next, the centroids of the segments are found and clustered based on distance metric. Then to track the objects linear Kalman filter is applied. To reduce effect of noise and creation of false tracks, the Kalman tracker is fine tuned. The tuning is done based on our active sonar specifications. After the tracks are initialed and updated they are subjected to a filtering stage to eliminate the noisy and unstable tracks. Also to eliminate object with a speed out of the diver speed range such as buoys and fast boats. Afterwards the result tracks are subjected to a classification stage to deiced the type of the object been tracked. Here the classification stage is to deice wither if the tracked object is an open circuit diver or a close circuit diver. At the classification stage, a small area around the object is extracted and a novel wake detection method is applied. The morphological features of the object with his wake is extracted. We used support vector machine to find the best classifier. The sonar training images and the test images are collected by ARMELSAN Defense Technologies Company using the portable diver detection sonar ARAS-2023. After applying the algorithm to the test sonar data, we get fine and stable tracks of the divers. The total classification accuracy achieved with the diver type is 97%.

Keywords: harbor protection, diver detection, active sonar, wake detection, diver classification

Procedia PDF Downloads 199
77 Representations of Wolves (Canis lupus) in Feature Films: The Detailed Analysis of the Text and Picture in the Chosen Movies

Authors: Barbara Klimek

Abstract:

Wolves are one of the most misrepresented species in literature and the media. They’re often portrayed as vicious, man-eating beasts whose main life goal is to hunt and kill people. Many movie directors use wolves as their main characters in different types of films, especially horror, thriller and science fiction movies to create gore and fear. This, in turn, results in people being afraid of wolves and wanting to destroy them. Such cultural creations caused wolves being stalked, abused and killed by people and in many areas they were completely destroyed. This paper analyzes the representations of wolves in the chosen films in the four main portrayed aspects: 1. the overall picture – true versus false, positive versus negative, based on stereotypes or realistic, displaying wolf behavior typical of the species or fake 2. subjectivity – how humans treat and talk about the animals – as subjects or as objects 3. animal welfare – how humans treat wolves and nature, are the human – animal relations positive and appropriate or negative and abusive 4. empathy – are human characters shown to co-feel the suffering with the wolves, do they display signs of empathy towards the animals, do the animals empathize with humans? The detailed analysis of the text and pictures presented in the chosen films concludes that wolves are especially misrepresented in the movies. Their behavior is shown as fake and negative, based on stereotypes and myths, the human – animal relations are shown mainly as negative where people fear the animals and hunt them and wolves stalk, follow, attack and kill humans. It shows that people do not understand the needs of these animals and are unable to show empathy towards them. The article will discuss the above-mentioned study results in detail and will present many examples. Animal representations in cultural creations, including film have a great impact on how people treat particular species of animals. The media shape people’s attitudes, what in turn results in people either respecting and protecting the animals or fearing, disliking and destroying the particular species.

Keywords: film, movies, representations, wolves

Procedia PDF Downloads 163
76 Revision of Arthroplasty in Rheumatoid and Osteoarthritis: Methotrexate and Radiographic Lucency in RA Patients

Authors: Mike T. Wei, Douglas N. Mintz, Lisa A. Mandl, Arielle W. Fein, Jayme C. Burket, Yuo-Yu Lee, Wei-Ti Huang, Vivian P. Bykerk, Mark P. Figgie, Edward F. Di Carlo, Bruce N. Cronstein, Susan M. Goodman

Abstract:

Background/Purpose: Rheumatoid arthritis (RA) patients have excellent total hip arthroplasty (THA) survival, and methotrexate (MTX), an anti-inflammatory disease modifying drug which may affect bone reabsorption, may play a role. The purpose of this study is to determine the diagnosis leading to revision THA (rTHA) in RA patients and to assess the association of radiographic lucency with MTX use. Methods: All patients with validated diagnosis of RA in the institution’s THA registry undergoing rTHA from May 2007 - February 2011 were eligible. Diagnosis leading to rTHA and medication use was determined by chart review. Osteolysis was evaluated on available radiographs by measuring maximum lucency in each Gruen zone. Differences within RA patients with/without MTX in osteolysis, demographics, and medications were assessed with chi-squared, Fisher's exact tests or Mann-Whitney U tests as appropriate. The error rate for multiple comparisons of lucency in the different Gruen zones was corrected via false discovery rate methods. A secondary analysis was performed to determine differences in diagnoses leading to revision between RA and matched OA controls (2:1 match by sex age +/- 5 years). OA exclusion criteria included presence of rheumatic diseases, use of MTX, and lack of records. Results: 51 RA rTHA were identified and compared with 103 OA. Mean age for RA was 57.7 v 59.4 years for OA (p = 0.240). 82.4% RA were female v 83.5% OA (p = 0.859). RA had lower BMI than OA (25.5 v 28.2; p = 0.166). There was no difference in diagnosis leading to rTHA, including infection (RA 3.9 v OA 6.8%; p = 0.719) or dislocation (RA 23.5 v OA 23.3%; p = 0.975). There was no significant difference in the length of time the implant was in before revision: RA 11.0 v OA 8.8 years (p = 0.060). Among RA with/without MTX, there was no difference in use of biologics (30.0 v 43.3%, p = 0.283), steroids (47.6 v 50.0%, p = 0.867) or bisphosphonates (23.8 v 33.3%, p = 0.543). There was no difference in rTHA diagnosis with/without MTX, including loosening (52.4 v 56.7%, p = 0.762). There was no significant difference in lucencies with MTX use in any Gruen zone. Patients with MTX had femoral stem subsidence of 3.7mm v no subsidence without MTX (p = 0.006). Conclusion: There was no difference in the diagnosis leading to rTHR in RA and OA, although RA trended longer prior to rTHA. In this small retrospective study, there were no significant differences associated with MTX exposure or radiographic lucency among RA patients. The significance of subsidence is not clear. Further study of arthroplasty survival in RA patients is warranted.

Keywords: hip arthroplasty, methotrexate, revision arthroplasty, rheumatoid arthritis

Procedia PDF Downloads 218
75 Prevalence of Treponema pallidum Infection among HIV-Seroreactive Patients in Kano, Nigeria

Authors: Y. Mohammed, A. I. Kabuga

Abstract:

Sexually transmitted infections (STIs) have continued to be a major public health problem in sub-Saharan Africa especially with the recent resurgence of syphilis. Syphilis is a systemic disease caused by the bacterium, spirochete Treponema pallidum and has been reported as one of the common sexually transmitted infections (STIs) in Nigeria. Presence of genital ulcer disease from syphilis facilitates human immunodeficiency virus (HIV) transmission and their ¬diagnosis is essential for the proper management. Venereal Disease Research Laboratory (VDRL) test is used as a screening test for the diagnosis of syphilis. However, unusual VDRL test results have been reported in HIV-infected persons with syphilis. There are reports showing higher than expected VDRL titers as well as biological false positive in most of the studies. A negative Rapid Plasma Reagin (RPR) test or VDRL test result may not rule out syphilis in patients with HIV infection. For laboratory confirmation of syphilis, one specific Treponemal test, namely, Fluroscent Treponemal Antibody Absorption (FTA-ABS) test or Treponema Pallidum Haemagglutination Assay (TPHA) should be done along with VDRL. A prospective cross sectional study was conducted for 2 years from Jun, 2012 to Jun 2014 to determine the prevalence of syphilis in HIV-seroreactive patients at 5 selected HIV/AIDS treatment and counseling centers in Kano State, North Western, Nigeria. New HIV-Seroreactive patients who gave informed consent to participate in the study were recruited. Venereal Diseases Research Laboratory (VDRL) test for Syphilis screening was performed on the same sera samples which were collected for HIV testing. A total of 238 patients, 113 (47%) males and 125 (53%) females, were enrolled. In the present study, 238 HIV-seropositive patients were screened for syphilis by VDRL test. Out of these 238 cases, 72 (32%) patients were positive for TPHA and 8 (3.4%) patients were reactive for VDRL in various titers with an overall prevalence of 3.4%. All the eight patients who were reactive for VDRL test were also positive for TPHA test. In Conclusions, with high prevalence of syphilis among HIV-infected people from this study, it is recommended that serological testing for syphilis should be carried out in all patients with newly diagnosed HIV infection. Detection and treatment of STI should have a central role in HIV prevention and control. This will help in proper management of patients having STIs and HIV co infection.

Keywords: HIV, infections, STIs, syphilis

Procedia PDF Downloads 284
74 Predicting Success and Failure in Drug Development Using Text Analysis

Authors: Zhi Hao Chow, Cian Mulligan, Jack Walsh, Antonio Garzon Vico, Dimitar Krastev

Abstract:

Drug development is resource-intensive, time-consuming, and increasingly expensive with each developmental stage. The success rates of drug development are also relatively low, and the resources committed are wasted with each failed candidate. As such, a reliable method of predicting the success of drug development is in demand. The hypothesis was that some examples of failed drug candidates are pushed through developmental pipelines based on false confidence and may possess common linguistic features identifiable through sentiment analysis. Here, the concept of using text analysis to discover such features in research publications and investor reports as predictors of success was explored. R studios were used to perform text mining and lexicon-based sentiment analysis to identify affective phrases and determine their frequency in each document, then using SPSS to determine the relationship between our defined variables and the accuracy of predicting outcomes. A total of 161 publications were collected and categorised into 4 groups: (i) Cancer treatment, (ii) Neurodegenerative disease treatment, (iii) Vaccines, and (iv) Others (containing all other drugs that do not fit into the 3 categories). Text analysis was then performed on each document using 2 separate datasets (BING and AFINN) in R within the category of drugs to determine the frequency of positive or negative phrases in each document. A relative positivity and negativity value were then calculated by dividing the frequency of phrases with the word count of each document. Regression analysis was then performed with SPSS statistical software on each dataset (values from using BING or AFINN dataset during text analysis) using a random selection of 61 documents to construct a model. The remaining documents were then used to determine the predictive power of the models. Model constructed from BING predicts the outcome of drug performance in clinical trials with an overall percentage of 65.3%. AFINN model had a lower accuracy at predicting outcomes compared to the BING model at 62.5% but was not effective at predicting the failure of drugs in clinical trials. Overall, the study did not show significant efficacy of the model at predicting outcomes of drugs in development. Many improvements may need to be made to later iterations of the model to sufficiently increase the accuracy.

Keywords: data analysis, drug development, sentiment analysis, text-mining

Procedia PDF Downloads 113
73 Mitigation of Cascading Power Outage Caused Power Swing Disturbance Using Real-time DLR Applications

Authors: Dejenie Birile Gemeda, Wilhelm Stork

Abstract:

The power system is one of the most important systems in modern society. The existing power system is approaching the critical operating limits as views of several power system operators. With the increase of load demand, high capacity and long transmission networks are widely used to meet the requirement. With the integration of renewable energies such as wind and solar, the uncertainty, intermittence bring bigger challenges to the operation of power systems. These dynamic uncertainties in the power system lead to power disturbances. The disturbances in a heavily stressed power system cause distance relays to mal-operation or false alarms during post fault power oscillations. This unintended operation of these relays may propagate and trigger cascaded trappings leading to total power system blackout. This is due to relays inability to take an appropriate tripping decision based on ensuing power swing. According to the N-1 criterion, electric power systems are generally designed to withstand a single failure without causing the violation of any operating limit. As a result, some overloaded components such as overhead transmission lines can still work for several hours under overload conditions. However, when a large power swing happens in the power system, the settings of the distance relay of zone 3 may trip the transmission line with a short time delay, and they will be acting so quickly that the system operator has no time to respond and stop the cascading. Misfiring of relays in absence of fault due to power swing may have a significant loss in economic performance, thus a loss in revenue for power companies. This research paper proposes a method to distinguish stable power swing from unstable using dynamic line rating (DLR) in response to power swing or disturbances. As opposed to static line rating (SLR), dynamic line rating support effective mitigation actions against propagating cascading outages in a power grid. Effective utilization of existing transmission lines capacity using machine learning DLR predictions will improve the operating point of distance relay protection, thus reducing unintended power outages due to power swing.

Keywords: blackout, cascading outages, dynamic line rating, power swing, overhead transmission lines

Procedia PDF Downloads 99
72 Cross-sectional Developmental Trajectories of Executive Function and Relations to Theory of Mind in Autism Spectrum Disorder

Authors: Evangelia-Chrysanthi Kouklari, Evdokia Tagkouli, Vassiliki Ntre, Artemios Pehlivanidis, Stella Tsermentseli, Gerasimos Kolaitis, Katerina Papanikolaou

Abstract:

Executive Function (EF) is a set of goal-directed cognitive skills essentially needed in problem-solving and social behavior. Developmental EF research has indicated that EF emerges early in life and marks dramatic changes before the age of 5. Research evidence has suggested that it may continue to develop up to adolescence as well, following the development of the prefrontal cortex. Over the last decade, research evidence has suggested distinguished domains of cool and hot EF, but traditionally the development of EF in Autism Spectrum Disorder (ASD) has been examined mainly with tasks that address the “cool” cognitive aspects of EF. Thus, very little is known about the development of “hot” affective EF processes and whether the cross-sectional developmental pathways of cool and hot EF present similarities in ASD. Cool EF has also been proven to have a strong correlation with Theory of Mind (ToM) in young and middle childhood in typical development and in ASD, but information about the relationship of hot EF to ToM skills is minimal. The present study’s objective was to explore the age-related changes of cool and hot EF in ASD participants from middle childhood to adolescence, as well as their relationship to ToM. This study employed an approach of cross-sectional developmental trajectories to investigate patterns of cool and hot EF relative to chronological age within ASD. Eighty-two participants between 7 and 16 years of age were recruited to undertake measures that assessed cool EF (working memory, cognitive flexibility, planning & inhibition), hot EF (affective decision making & delay discounting) and ToM (false belief and mental state/emotion recognition). Results demonstrated that trajectories of all cool EF presented age-related changes in ASD (improvements with age). With regards to hot EF, affective decision-making presented age-related changes, but for delay discounting, there were no statistically significant changes found across younger and older ASD participants. ToM was correlated only to cool EF. Theoretical implications are discussed as the investigation of the cross-sectional developmental trajectories of the broader EF (cool and hot domains) may contribute to better defining cognitive phenotypes in ASD. These findings highlight the need to examine developmental trajectories of both hot and cool EF in research and clinical practice as they may aid in enhancing diagnosis or better-informed intervention programs.

Keywords: autism spectrum disorder, developmental trajectories, executive function, theory of mind

Procedia PDF Downloads 108
71 The Good, the Bad and the Unknown: Exploring the Knowledge, Attitude and Behaviour towards the Use of Insecticide Treated Mosquito Nets among Pregnant Women and Children in Rural South-Western Uganda

Authors: Ivan M. Taremwa, Scholastic Ashaba, Harriet O. Adrama, Carlrona Ayebazibwe, Daniel Omoding, Imelda Kemeza, Jane Yatuha, Thadeus Turuho, Noni E. MacDonald, Robert Hilliard

Abstract:

Background: The burden of malaria in Uganda remains unacceptably high, especially among children and pregnant women. To prevent malaria related complications, household possession and use of Insecticide Treated mosquito Nets (ITNs) has become a common practice in the country. Despite the availability of ITNs, the number of malaria cases has not gone down. We sought to explore knowledge, attitude, and behaviour towards the use of ITNs as a nightly malaria prevention strategy among pregnant women and children under five years of age in rural southwest Uganda. Materials and Methods: This was a community based, descriptive cross-sectional study, in which households with children under 5 years, and/or pregnant women were enrolled. We used a structured questionnaire to collect data on participants’ understanding of the causes, signs and symptoms of malaria; use of ITNs to prevent malaria; attitudes and behaviours towards the use of ITNs. We also conducted key informant interviews (KIIs) to get in-depth understanding of responses from the participants. We analysed quantitative data using STATA version 12. Qualitative findings from the KIIs were transcribed and translated, and manually analysed using thematic content analysis. Results: Of the 369 households enrolled, 98.6% (N=363) households had children under five. Most participants (41.2%, N=152) were in the 21-30 years of age category (mean age; 32.2). 98.6% (N=362) of the respondents considered ITNs a key malaria prevention strategy. The ITN possession rate was 84.0% (N=310), of these, 67.0% (N=205) consistently used them. 39% of the respondents did not have a positive attitude towards ITNs, as they considered more the perceived effects of ITNs. Conclusions: Although 84.0% of the respondents possessed ITNs, many were not consistently using them. There is need to engage all stakeholders (including cultural leaders, community health workers, religious leaders and the government) in the malaria prevention campaigns using ITNs through: a) government’s concerted effort to ensure universal access of good quality ITNs, b) end-user directed education to correct false beliefs and misinformation, c) telling the ITN success stories to improve on the usage.

Keywords: ITNs use, malaria, pregnant women, rural Uganda

Procedia PDF Downloads 320