Search results for: malware infection propagating malicious code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2971

Search results for: malware infection propagating malicious code

2641 Effect of Modeling of Hydraulic Form Loss Coefficient to Break on Emergency Core Coolant Bypass

Authors: Young S. Bang, Dong H. Yoon, Seung H. Yoo

Abstract:

Emergency Core Coolant Bypass (ECC Bypass) has been regarded as an important phenomenon to peak cladding temperature of large-break loss-of-coolant-accidents (LBLOCA) in nuclear power plants (NPP). A modeling scheme to address the ECC Bypass phenomena and the calculation of LBLOCA using that scheme are discussed in the present paper. A hydraulic form loss coefficient (HFLC) from the reactor vessel downcomer to the broken cold leg is predicted by the computational fluid dynamics (CFD) code with a variation of the void fraction incoming from the downcomer. The maximum, mean, and minimum values of FLC are derived from the CFD results and are incorporated into the LBLOCA calculation using a system thermal-hydraulic code, MARS-KS. As a relevant parameter addressing the ECC Bypass phenomena, the FLC to the break and its range are proposed.

Keywords: CFD analysis, ECC bypass, hydraulic form loss coefficient, system thermal-hydraulic code

Procedia PDF Downloads 203
2640 Establish a Company in Turkey for Foreigners

Authors: Mucahit Unal, Ibrahim Arslan

Abstract:

The New Turkish Commercial Code (TCC) No. 6102 was published in the Official Gazette on February 14, 2011. As stated in the New Turkish Commercial Code No. 6102 and Law No. 6103 on Validity and Application of the Turkish Commercial Code, TCC came into effect on July 1, 2012. The basic purpose of the TCC is to form corporate governance coherent with the international standards; to provide transparency in company management; to adjust the Turkish Commercial Code rules with European Union legislations and to simplify establishing a company for foreigner investors to move investments to Turkish market. In this context according to TCC, joint stock companies and limited liability companies can establish with only one single shareholder; the one single shareholder can be foreigner; all board of director members can be foreigner, also all shareholders and board of director members can be non-resident foreigners. Additionally, TCC does not require physical participation to the general shareholders and board members meetings. TCC allows that the general shareholders and board members meetings can hold in an electronic form and resolution of these meetings may also be approved via electronic signatures. Through this amendment, foreign investors no longer have to deal with red tapes. This amendment also means the TCC prevents foreign companies from incurring unnecessary travel expenses. In accordance with all this amendments about TCC, to invest in Turkish market is easy, simple and transparent for foreigner investors and also investors can establish a company in Turkey, irrespective of nationality or place of residence. This article aims to analyze ‘Establish a Company in Turkey for Foreigners’ and inform investors about investing (especially establishing a company) in the Turkish market.

Keywords: establish a company, foreigner investors, invest in Turkish market, Turkish commercial code

Procedia PDF Downloads 236
2639 Distinct Antiviral Pathway for ZFP36-Like Family Members Against Flavivirus Infection

Authors: Ren-Jye Lin, Li-Hsiung Lin, Bing-Cheng Liu, Ching-Len Liao

Abstract:

The human zinc finger protein 36-like protein family, containing zinc finger protein 36-like 1 (ZFP36L1) and zinc finger protein 36-like 2 (ZFP36L2), belongs to CCCH-type zinc-finger protein identified as an RNA-binding protein that participates in controlling posttranscriptional regulation via RNA decay pathways. Recently, we demonstrated that human ZFP36L1 showed potent antiviral activity against flavivirus Infection by both 5´-3´ XRN1 and 3´-5´RNA-exosome RNA decay pathways (Journal of Virology 2022 Jan 12;96(1): e0166521). However, another zinc finger protein 36-like protein member, ZFP36L2, in the host defense response against flaviviruses has yet to be addressed. Here, we also demonstrate that ZFP36L2 functions as a host innate defender against flaviviruses, including Japanese encephalitis virus (JEV) and dengue virus (DENV). Overexpression of ZFP36L2 reduced JEV and DENV infection, and ZFP36L2 knockdown significantly promoted viral replication. Distinct from the antiviral mechanism of ZFP36L1, ZFP36L2 inhibits flavivirus infection by only a 5´-3´ XRN1-mediated RNA decay pathway but not the 3´-5´RNA-exosome RNA decay pathway. Human ZFP36L1 and ZFP36L2 can restrict flavivirus replication by directly binding and destabilizing viral RNA. Thus, for the first time, human zinc finger protein 36-like family members, ZFP36L1 and ZFP36L2, are identified as host antiviral factors that can bind and degrade flavivirus viral RNA by diverse antiviral mechanisms.

Keywords: ZFP36L1, ZFP36L2, 5'-3' exonuclease XRN1, antiviral mechansim

Procedia PDF Downloads 49
2638 Investigating the Use of English Arabic Codeswitching in EFL classroom Oral Discourse Case study: Middle school pupils of Ain Fekroun, Wilaya of Oum El Bouaghi Algeria

Authors: Fadila Hadjeris

Abstract:

The study aims at investigating the functions of English-Arabic code switching in English as a foreign language classroom oral discourse and the extent to which they can contribute to the flow of classroom interaction. It also seeks to understand the views, beliefs, and perceptions of teachers and learners towards this practice. We hypothesized that code switching is a communicative strategy which facilitates classroom interaction. Due to this fact, both teachers and learners support its use. The study draws on a key body of literature in bilingualism, second language acquisition, and classroom discourse in an attempt to provide a framework for considering the research questions. It employs a combination of qualitative and quantitative research methods which include classroom observations and questionnaires. The analysis of the recordings shows that teachers’ code switching to Arabic is not only used for academic and classroom management reasons. Rather, the data display instances in which code switching is used for social reasons. The analysis of the questionnaires indicates that teachers and pupils have different attitudes towards this phenomenon. Teachers reported their deliberate switching during EFL teaching, yet the majority was against this practice. According to them, the use of the mother has detrimental effects on the acquisition and the practice of the target language. In contrast, pupils showed their preference to their teachers’ code switching because it enhances and facilitates their understanding. These findings support the fact that the shift to pupils’ mother tongue is a strategy which aids and facilitates the teaching and the learning of the target language. This, in turn, necessitates recommendations which are suggested to teachers and course designers.

Keywords: bilingualism, codeswitching, classroom interaction, classroom discourse, EFL learning/ teaching, SLA

Procedia PDF Downloads 435
2637 Bit Error Rate (BER) Performance of Coherent Homodyne BPSK-OCDMA Network for Multimedia Applications

Authors: Morsy Ahmed Morsy Ismail

Abstract:

In this paper, the structure of a coherent homodyne receiver for the Binary Phase Shift Keying (BPSK) Optical Code Division Multiple Access (OCDMA) network is introduced based on the Multi-Length Weighted Modified Prime Code (ML-WMPC) for multimedia applications. The Bit Error Rate (BER) of this homodyne detection is evaluated as a function of the number of active users and the signal to noise ratio for different code lengths according to the multimedia application such as audio, voice, and video. Besides, the Mach-Zehnder interferometer is used as an external phase modulator in homodyne detection. Furthermore, the Multiple Access Interference (MAI) and the receiver noise in a shot-noise limited regime are taken into consideration in the BER calculations.

Keywords: OCDMA networks, bit error rate, multiple access interference, binary phase-shift keying, multimedia

Procedia PDF Downloads 148
2636 Detection of Helicobacter Pylori by PCR and ELISA Methods in Patients with Hyperlipidemia

Authors: Simin Khodabakhshi, Hossein Rassi

Abstract:

Hyperlipidemia refers to any of several acquired or genetic disorders that result in a high level of lipids circulating in the blood. Helicobacter pylori infection is a contributing factor in the progression of hyperlipidemia with serum lipid changes. The aim of this study was to detect of Helicobacter pylori by PCR and serological methods in patients with hyperlipidemia. In this case-control study, 174 patients with hyperlipidemia and 174 healthy controls were studied. Also, demographics, physical and biochemical parameters were performed in all samples. The DNA extracted from blood specimens was amplified by H pylori cagA specific primers. The results show that H. pylori cagA positivity was detected in 79% of the hyperlipidemia and in 56% of the control group by ELISA test and 49% of the hyperlipidemia and in 24% of the control group by PCR test. Prevalence of H. pylori infection was significantly higher in hyperlipidemia as compared to controls. In addition, patients with hyperlipidemia had significantly higher values for triglyceride, total cholesterol, LDL-C, waist to hip ratio, body mass index, diastolic and systolic blood pressure and lower levels of HDL-C than control participants (all p < 0.0001). Our result detected the ELISA was a rapid and cost-effective detection and considering the high prevalence of cytotoxigenic H. pylori strains, cag A is suggested as a promising target for PCR and ELISA tests for detection of infection with toxigenic strains. In general, it can be concluded that molecular analysis of H. pylori cagA and clinical parameters are important in early detection of hyperlipidemia and atherosclerosis with H. pylori infection by PCR and ELISA tests.

Keywords: Helicobacter pylori, hyperlipidemia, PCR, ELISA

Procedia PDF Downloads 171
2635 Performance Comparison of Non-Binary RA and QC-LDPC Codes

Authors: Ni Wenli, He Jing

Abstract:

Repeat–Accumulate (RA) codes are subclass of LDPC codes with fast encoder structures. In this paper, we consider a nonbinary extension of binary LDPC codes over GF(q) and construct a non-binary RA code and a non-binary QC-LDPC code over GF(2^4), we construct non-binary RA codes with linear encoding method and non-binary QC-LDPC codes with algebraic constructions method. And the BER performance of RA and QC-LDPC codes over GF(q) are compared with BP decoding and by simulation over the Additive White Gaussian Noise (AWGN) channels.

Keywords: non-binary RA codes, QC-LDPC codes, performance comparison, BP algorithm

Procedia PDF Downloads 351
2634 Development of Clinical Nursing Practice Guideline to Prevent Infection During Intubation in Suspected or Confirmed Covid-19 Patients

Authors: Sarinra Thongmee, Adithep Mingsuan, Chanyapak Polkhet, Supattra Wongsuk, Krittaphon Prakobsaeng

Abstract:

The purposes of this research and development was to develop and evaluation of clinical nursing practice guideline (CNPG) for the prevention of infection during intubation in patient withsuspected or confirmedCOVID-19 patient. This study was developed by using the evidence based practice model of Soukup (2000) as a conceptual framework. The study consisted of 4 steps: 1) situational analysis of intubation service in patients with confirmed COVID-19, 2) development the CNPG, 3) apply the NPG to trial, and 4) evaluation of the NPG. Thesample consisted of 52 nurse anesthetists and 25 infected or suspected COVID-19 patients. The research instrument consisted of 1) CNPG, 2) the nurses anesthetist opinion questionnaire to the guideline, 3) the evaluation practice form, and 4) the nurse anesthetist knowledge test on nursing care of patients infected with COVID-19. Data were analyzed by using descriptive statistics, and Wilcoxon matched-pairs signed rank test. The results found that this developed NPG consists of 4 sections: 1) NPG for Preventing Airborne Infection Prevention2) preparation of anesthetic and intubation equipments 3) roles and duties of the intubation team 4) guidelines for intubation in suspected or confirmed COVID-19patients. The result found that 1) provider: using NPG in providers revealed that nurse anesthetist had higher mean of knowledge scores than before using NPG statistically significant at the 0.05 level (p<0.01) and able to follow the NPG 100% in all activities. The anesthetic team was not infected with COVID-19from intubation outside operating room.2) Client: the patient was safe, no complications from intubation. Summary CNPG to prevent infection in intubation of suspected or confirmedCOVID-19 patient was appropriate and applicable to practice.

Keywords: nursing practice guideline, prevention of infection, endotracheal intubation, COVID-19

Procedia PDF Downloads 118
2633 Tertiary Level Teachers' Beliefs about Codeswitching

Authors: Hoa Pham

Abstract:

Code switching, which can be described as the use of students’ first language in second language classrooms, has long been a controversial topic in the area of language teaching and second language acquisition. While this has been widely investigated across different contexts, little empirical research has been undertaken in Vietnam. The findings of this study contribute to our understanding of bilingual discourse and code switching practices in content and language integrated classrooms, which has significant implications for language teaching and learning in general and in particular for language pedagogy at tertiary level in Vietnam. This study examines the accounts the teachers articulated for their code switching practices in content-based Business English in Vietnam. Data were collected from five teachers through the use of stimulated recall interviews facilitated by the video data to garner the teachers' cognitive reflection, and allowed them to vocalise the motivations behind their code switching behaviour in particular contexts. The literature has recommended that when participants are provided with a large amount of stimuli or cues, they will experience an original situation again in their imagination with great accuracy. This technique can also provide a valuable "insider" perspective on the phenomenon under investigation which complements the researcher’s "outsider" observation. This can create a relaxed atmosphere during the interview process, which in turn promotes the collection of rich and diverse data. Also, participants can be empowered by this technique as they can raise their own concerns and discuss instances which they find important or interesting. The data generated through this study were analysed using a constant comparative approach. The study found that the teachers indicated their support for the use of code switching in their pedagogical practices. Particularly, as a pedagogical resource, the teachers saw code switching to the L1 playing a key role in facilitating the students' comprehension of both content knowledge and the target language. They believed the use of the L1 accommodates the students' current language competence and content knowledge. They also expressed positive opinions about the role that code switching plays in stimulating students' schematic language and content knowledge, encouraging retention and interest in learning and promoting a positive affective environment in the classroom. The teachers perceived that their use of code switching to the L1 helps them meet the students' language needs and prepares them for their study in subsequent courses and addresses functional needs so that students can cope with English language use outside the classroom. Several factors shaped the teachers' perceptions of their code switching practices, including their accumulated teaching experience, their previous experience as language learners, their theoretical understanding of language teaching and learning, and their knowledge of the teaching context. Code switching was a typical phenomenon in the observed classes and was supported by the teachers in certain contexts. This study reinforces the call in the literature to recognise this practice as a useful instructional resource.

Keywords: codeswitching, language teaching, teacher beliefs, tertiary level

Procedia PDF Downloads 412
2632 Comprehensive Approach to Control Virus Infection and Energy Consumption in An Occupant Classroom

Authors: SeyedKeivan Nateghi, Jan Kaczmarczyk

Abstract:

People nowadays spend most of their time in buildings. Accordingly, maintaining a good quality of indoor air is very important. New universal matters related to the prevalence of Covid-19 also highlight the importance of indoor air conditioning in reducing the risk of virus infection. Cooling and Heating of a house will provide a suitable zone of air temperature for residents. One of the significant factors in energy demand is energy consumption in the building. In general, building divisions compose more than 30% of the world's fundamental energy requirement. As energy demand increased, greenhouse effects emerged that caused global warming. Regardless of the environmental damage to the ecosystem, it can spread infectious diseases such as malaria, cholera, or dengue to many other parts of the world. With the advent of the Covid-19 phenomenon, the previous instructions to reduce energy consumption are no longer responsive because they increase the risk of virus infection among people in the room. Two problems of high energy consumption and coronavirus infection are opposite. A classroom with 30 students and one teacher in Katowice, Poland, considered controlling two objectives simultaneal. The probability of transmission of the disease is calculated from the carbon dioxide concentration of people. Also, in a certain period, the amount of energy consumption is estimated by EnergyPlus. The effect of three parameters of number, angle, and time or schedule of opening windows on the probability of infection transmission and energy consumption of the class were investigated. Parameters were examined widely to determine the best possible condition for simultaneous control of infection spread and energy consumption. The number of opening windows is discrete (0,3), and two other parameters are continuous (0,180) and (8 AM, 2 PM). Preliminary results show that changes in the number, angle, and timing of window openings significantly impact the likelihood of virus transmission and class energy consumption. The greater the number, tilt, and timing of window openings, the less likely the student will transmit the virus. But energy consumption is increasing. When all the windows were closed at all hours of the class, the energy consumption for the first day of January was only 0.2 megajoules. In comparison, the probability of transmitting the virus per person in the classroom is more than 45%. But when all windows were open at maximum angles during class, the chance of transmitting the infection was reduced to 0.35%. But the energy consumption will be 36 megajoules. Therefore, school classrooms need an optimal schedule to control both functions. In this article, we will present a suitable plan for the classroom with natural ventilation through windows to control energy consumption and the possibility of infection transmission at the same time.

Keywords: Covid-19, energy consumption, building, carbon dioxide, energyplus

Procedia PDF Downloads 73
2631 The Number of Corona Virus Infections in 2020

Authors: Yasaswi Vengalasetti, Jacob Eisenach, Jay Bhattacharya

Abstract:

Seroprevalence studies can provide an estimation of the Infection Fatality Rate (IFR), the probability of death given infection. Measuring the seroprevalence and reported deaths of an area within a given time frame an IFR can be estimated. With this IFR calculation, we can then observe COVID-19 death figures in different countries around the world and estimate the number of cases since the onset of the pandemic. There is a large range for estimated COVID-19 infections across different countries. This ranged from 0.659 million infections in Hong Kong to 277 million infections in India. The largest estimated share of the population infected is 63% in Peru and the lowest is 3% in Norway. For younger populations, COVID-19 is most fatal in South America; for older populations, it is most fatal in North America. The Asian regions stand out with significantly lower IFRs in older populations: at 80 years old, COVID-19 is about three times as fatal than in South Asia and about twelve times as fatal than in East Asia. The weighted average for the share of the population infected, the sum of infections divided by the sum of populations across all countries, is 23%.

Keywords: epidemiology, seroprevalence, covid-19, infection fatality rate

Procedia PDF Downloads 97
2630 Identification of COVID-SARS Variants Based on Lactate Test Results

Authors: Zoltan Horvath, Dora Nagy

Abstract:

In this research, it was examined whether individual COVID variants cause differences in the lactate curve of cyclists. After all, the virus variants attacked different organs in our body during the infections. During our tests, we used a traditional lactate step test, the results of which were compared with the values before the infection. In the tests, it has been proven that different virus variants show unique lactate curves. In this way, based on the lactate curve, it is possible to identify which variant caused the disease. Thanks to this, it has been shorten the return time, because we can apply the best return protocol after infection to the competitors.

Keywords: COVID-Sars19, lactate, virus mutation, lactate profile

Procedia PDF Downloads 41
2629 A Qualitative Evidence of the Markedness of Code Switching during Commercial Bank Service Encounters in Ìbàdàn Metropolis

Authors: A. Robbin

Abstract:

In a multilingual setting like Nigeria, the success of service encounters is enhanced by the use of a language that ensures the linguistic and persuasive demands of the interlocutors. This study examined motivations for code switching as a negotiation strategy in bank-hall desk service encounters in Ìbàdàn metropolis using Myers-Scotton’s exploration on markedness in language use. The data consisted of transcribed audio recording of bank-hall service encounters, and direct observation of bank interactions in two purposively sampled commercial banks in Ìbàdàn metropolis. The data was subjected to descriptive linguistic analysis using Myers Scotton’s Markedness Model.  Findings reveal that code switching is frequently employed during different stages of service encounter: greeting, transaction and closing to fulfil relational, bargaining and referential functions. Bank staff and customers code switch to make unmarked, marked and explanatory choices. A strategy used to identify with customer’s cultural affiliation, close status gap, and appeal to begrudged customer; or as an explanatory choice with non-literate customers for ease of communication. Bankers select English to maintain customers’ perceptions of prestige which is retained or diverged from depending on their linguistic preference or ability.  Yoruba is seen as an efficient negotiation strategy with both bankers and their customers, making choices within conversation to achieve desired conversational and functional aims.

Keywords: banking, bilingualism, code-switching, markedness, service encounter

Procedia PDF Downloads 183
2628 Knowledge, Attitude, and Practice of Pre-exposure Prophylaxis on Human immunodeficiency virus Infection of Students at National University–Manila

Authors: Roel Guinto Jr, John Peter Dacanay, Edison Ramos

Abstract:

The Philippines now has the fastest-growing HIV epidemic in the entire Asia-Pacific region. According to the January 2023 HIV/AIDS Registry of the Philippines of the Department of Health (DOH), there were 86 newly reported HIV cases involving 19 years old and below. A cure for HIV is not yet readily available but effective preventive measures to prevent its transmission. Pre-Exposure Prophylaxis is a biomedical intervention for HIV infection in the form of a pill. Students play a significant role in identifying solutions to preventing the transmission of HIV Infection, making it critical to assess their Knowledge, Attitude, and Practice of Pre-Exposure Prophylaxis on HIV Infection. A study was conducted among 390 regular students from different college departments at National University – Manila. A structured questionnaire was used to collect data and other statistical tools were used to analyze data. The findings reveal that most students had no knowledge or idea about PreExposure Prophylaxis before being interviewed. It also shows that students have a positive attitude toward the practice of Pre-Exposure Prophylaxis. The study revealed that there is also a significant relationship between the Knowledge and the Socio-demographic profile of the respondents. Knowledge, Attitude, and Practices on PrEP of students were overall identified, and areas of improvement were also recognized. Sex Education and Sexual Health Awareness should be implemented to enhance students’ knowledge of practicing safe sex to help prevent HIV Transmission.

Keywords: HIV, cure, biomedical intervention, pre-exposure prophylaxis, pill, knowledge, attitude, practice, sex education, sexual health awareness

Procedia PDF Downloads 42
2627 Myanmar Character Recognition Using Eight Direction Chain Code Frequency Features

Authors: Kyi Pyar Zaw, Zin Mar Kyu

Abstract:

Character recognition is the process of converting a text image file into editable and searchable text file. Feature Extraction is the heart of any character recognition system. The character recognition rate may be low or high depending on the extracted features. In the proposed paper, 25 features for one character are used in character recognition. Basically, there are three steps of character recognition such as character segmentation, feature extraction and classification. In segmentation step, horizontal cropping method is used for line segmentation and vertical cropping method is used for character segmentation. In the Feature extraction step, features are extracted in two ways. The first way is that the 8 features are extracted from the entire input character using eight direction chain code frequency extraction. The second way is that the input character is divided into 16 blocks. For each block, although 8 feature values are obtained through eight-direction chain code frequency extraction method, we define the sum of these 8 feature values as a feature for one block. Therefore, 16 features are extracted from that 16 blocks in the second way. We use the number of holes feature to cluster the similar characters. We can recognize the almost Myanmar common characters with various font sizes by using these features. All these 25 features are used in both training part and testing part. In the classification step, the characters are classified by matching the all features of input character with already trained features of characters.

Keywords: chain code frequency, character recognition, feature extraction, features matching, segmentation

Procedia PDF Downloads 294
2626 The Connection between the Schwartz Theory of Basic Values and Ethical Principles in Clinical Psychology

Authors: Matej Stritesky

Abstract:

The research deals with the connection between the Schwartz Theory of Basic Values and the ethical principles in psychology, on which the meta-code of ethics the European Federation of Psychological Associations is based. The research focuses on ethically problematic situations in clinical psychology in the Czech Republic. Based on the analysis of papers that identified ethically problematic situations faced by clinical psychologists, a questionnaire of ethically problematic situations in clinical psychology (EPSCP) was created for the purposes of the research. The questionnaire was created to represent situations that correspond to the 4 principles on which the meta-code of ethics the European Federation of Psychological Associations is based. The questionnaire EPSCP consists of descriptions of 32 situations that respondents evaluate on a scale from 1 (psychologist's behaviour is ethically perfectly fine) to 10 (psychologist's behaviour is ethically completely unacceptable). The EPSCP questionnaire, together with Schwartz's PVQ questionnaire, will be presented to 60 psychology students. The relationship between principles in clinical psychology and the values on Schwartz´s value continuum will be described using multidimensional scaling. A positive correlation is assumed between the higher-order value of openness to change and problematic ethical situations related to the principle of integrity; a positive correlation between the value of the higher order of self-transcendence and the principle of respect and responsibility; a positive correlation between the value of the higher order of conservation and the principle of competence; and negative correlation between the value of the higher order of ego strengthening and sensitivity to ethically problematic situations. The research also includes an experimental part. The first half of the students are presented with the code of ethics of the Czech Association of Clinical Psychologists before completing the questionnaires, and to the second half of the students is the code of ethics presented after completing the questionnaires. In addition to reading the code of ethics, students describe the three rules of the code of ethics that they consider most important and state why they chose these rules. The output of the experimental part will be to determine whether the presentation of the code of ethics leads to greater sensitivity to ethically problematic situations.

Keywords: clinical psychology, ethically problematic situations in clinical psychology, ethical principles in psychology, Schwartz theory of basic values

Procedia PDF Downloads 94
2625 Hemolytic Anemia Monitored After Post-COVID-19 Infection: Changes Related to General Blood Parameters

Authors: Akbarov Elbek Elmurodovich

Abstract:

Introduction: We are analyzing the topic of hemolytic anemia observed in patients after COVID-19 infection. The purpose of this research is to investigate the development of hemolytic anemia, identify its causes, and study treatment methods. Objective and Task: The goal of our research is to analyze the changes in blood occurring after COVID-19 infection and study the development of hemolytic anemia. Our main task is to analyze the results and assess subsequent changes in patients. Materials and Methods: The study was conducted among patients treated with a diagnosis of COVID-19 in the Department of Infectious Diseases at the TTA 1-Multiprofile Clinic from March to August 2023. Out of the 32 patients included, 16 were female, and 16 were male. Monitoring Blood Coagulation in Patients: The hemoglobin level of patients upon admission was initially measured using the URITEST-150 analyzer. The average for women was 110 g/l, and for men was 120 g/l. Over the course of 3 months, a decrease was observed: an average of 72 g/l in women (a decrease of up to 35%) and 84 g/l in men (a decrease of up to 30%). In the next 2 months, the positive dynamics of hemoglobin levels were observed, with an average increase to 93 g/l in women (>28%) and 112 g/l in men (>25%). Research Results: Hemolytic anemia developed in men within 5 months, reaching up to 112 g/l. In women, this process required a longer period, with the last month of observation (6 months) showing that women reached levels of up to 112 g/l, similar to men. Conclusion: Hemolytic anemia observed in patients after COVID-19 infection was monitored for 6 months (5 months in men, 6 months in women), reaching up to 112 g/l. The first 3 months after contracting COVID showed the period of development of anemia, and the subsequent 3 months indicated a stabilization period in patients.

Keywords: COVID, anemia, hemoglobin, tma, virus, viral infrection

Procedia PDF Downloads 38
2624 Molecular Profiles of Microbial Etiologic Agents Forming Biofilm in Urinary Tract Infections of Pregnant Women by RTPCR Assay

Authors: B. Nageshwar Rao

Abstract:

Urinary tract infection (UTI) represents the most commonly acquired bacterial infection worldwide, with substantial morbidity, mortality, and economic burden. The objective of the study is to characterize the microbial profiles of uropathogenic in the obstetric population by RTPCR. Study design: An observational cross-sectional study was performed at a single tertiary health care hospital among 50 pregnant women with UTIs, including asymptomatic and symptomatic patients attending the outpatient department and inpatient department of Obstetrics and Gynaecology.Methods: Serotyping and genes detection of various uropathogens were studied using RTPCR. Pulse filed gel electrophoresis methods were used to determine the various genetic profiles. Results: The present study shows that CsgD protein, involved in biofilm formation in Escherichia coli, VIM1, IMP1 genes for Klebsiella were identified by using the RTPCR method. Our results showed that the prevalence of VIM1 and IMP1 genes and CsgD protein in E.coli showed a significant relationship between strong biofilm formation, and this may be due to the prevalence of specific genes. Finally, the genetic identification of RTPCR results for both bacteria was correlated with each other and concluded that the above uropathogens were common isolates in producing Biofilm in the pregnant woman suffering from urinary tract infection in our hospital observational study.

Keywords: biofilms, Klebsiella, E.coli, urinary tract infection

Procedia PDF Downloads 96
2623 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis

Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti

Abstract:

Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.

Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis

Procedia PDF Downloads 124
2622 Simulation of Reflectometry in Alborz Tokamak

Authors: S. Kohestani, R. Amrollahi, P. Daryabor

Abstract:

Microwave diagnostics such as reflectometry are receiving growing attention in magnetic confinement fusionresearch. In order to obtain the better understanding of plasma confinement physics, more detailed measurements on density profile and its fluctuations might be required. A 2D full-wave simulation of ordinary mode propagation has been written in an effort to model effects seen in reflectometry experiment. The code uses the finite-difference-time-domain method with a perfectly-matched-layer absorption boundary to solve Maxwell’s equations.The code has been used to simulate the reflectometer measurement in Alborz Tokamak.

Keywords: reflectometry, simulation, ordinary mode, tokamak

Procedia PDF Downloads 400
2621 Epstein, Barr Virus Alters ATM-Dependent DNA Damage Responses in Germinal Centre B-Cells during Early Infection

Authors: Esther N. Maina, Anna Skowronska, Sridhar Chaganti, Malcolm A. Taylor, Paul G. Murray, Tatjana Stankovic

Abstract:

Epstein-Barr virus (EBV) has been implicated in the pathogenesis of human tumours of B-cell origin. The demonstration that a proportion of Hodgkin lymphomas and all Burkitt’s lymphomas harbour EBV suggests that the virus contributes to the development of these malignancies. However, the mechanisms of lymphomagenesis remain largely unknown. To determine whether EBV causes DNA damage and alters DNA damage response in cells of EBV-driven lymphoma origin, Germinal Centre (GC) B cells were infected with EBV and DNA damage responses to gamma ionising radiation (IR) assessed at early time points (12hr – 72hr) after infection and prior to establishment of lymphoblastoid (LCL) cell lines. In the presence of EBV, we observed induction of spontaneous DNA DSBs and downregulation of ATM-dependent phosphorylation in response to IR. This downregulation coincided with reduced ability of infected cells to repair IR-induced DNA double-strand breaks, as measured by the kinetics of gamma H2AX, a marker of double-strand breaks, and by the tail moment of the comet assay. Furthermore, we found that alteration of DNA damage responses coincided with the expression of LMP-1 protein. The presence of the EBV virus did not affect the localization of the ATM-dependent DNA repair proteins to sites of damage but instead lead to an increased expression of PP5, a phosphatase that regulates ATM function. The impact of the virus on DNA repair was most prominent 24h after infection, suggesting that this time point is crucial for the viral establishment in B cells. Our results suggest that during an early infection EBV virus dampens crucial cellular responses to DNA double-strand breaks which facilitate successful viral infection, but at the same time might provide the mechanism for tumor development.

Keywords: EBV, ATM, DNA damage, germinal center cells

Procedia PDF Downloads 324
2620 Deep Neck Infection Associated with Peritoneal Sepsis: A Rare Death Case

Authors: Sait Ozsoy, Asude Gokmen, Mehtap Yondem, Hanife A. Alkan, Gulnaz T. Javan

Abstract:

Deep neck infection often develops due to upper respiratory tract and odontogenic infections. Gastrointestinal System perforation can occur for many reasons and is in need of the early diagnosis and prompt surgical treatment. In both cases late or incorrect diagnosis may lead to increase morbidity and high mortality. A patient with a diagnosis of deep neck abscess died while under treatment due to sepsis and multiple organ failure. Autopsy finding showed duodenal ulcer and this is reported in the literature.

Keywords: peptic ulcer perforation, peritonitis, retropharyngeal abscess, sepsis

Procedia PDF Downloads 470
2619 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 53
2618 Vaccination against Hepatitis B in Tunisian Health Care Workers

Authors: Asma Ammar, Nabiha Bouafia , Asma BenCheikh, Mohamed Mahjoub, Olfa Ezzi, Wadiaa Bannour, Radhia Helali, Mansour Njah

Abstract:

Background: The objective of the present study was to identify factors associated with vaccination against Hepatitis B virus (HBV) among healthcare workers (HWs) in the University Hospital Center (UHC) Farhat Hached Sousse, Tunisia. Methods: We conducted a descriptive cross-sectional study all licensed physicians (n= 206) and a representative sample of paramedical staff (n= 372) exercising at UHC Hached Sousse (Tunisia) during two months (January and February 2014). Data were collected using a self-administered and pre-tested questionnaire, which composed by 21 questions. In order to determinate factors associated with vaccination against hepatitis B among HWs, this questionnaire was based on the Health Belief Model, one of the most classical behavior theories. Logistic regression with the stepwise method of Hosmer and Lemeshow was used to identify the determinants of the use of vaccination against HBV. Results: The response rates were 79.8%. Fifty two percent believe that HBV is frequent in our healthcare units and 60.6% consider it a severe infection. The prevalence of HWs vaccination was 39%, 95% CI [34.49%; 43.5%]. In multivariate analysis, determinants of the use of vaccination against HBV among HWs were young age (p=10-4), male gender (p = 0. 006), high or very high importance accorded to health (p = 0.035), perception membership in a risk group for HBV infection (p = 0.038) and very favorable or favorable opinion about vaccination against HVB (p=10-4). Conclusion: The results of our study should be considered in any strategy for preventing VHB infection in HWs. In the mean time, coverage with standard vaccines should be improved also by supplying complete information on the risks of VHB infection and on the safety and efficacy of vaccination.

Keywords: Hepatitis B virus, healthcare workers, prevalence, vaccination

Procedia PDF Downloads 319
2617 Predictive Value of Hepatitis B Core-Related Antigen (HBcrAg) during Natural History of Hepatitis B Virus Infection

Authors: Yanhua Zhao, Yu Gou, Shu Feng, Dongdong Li, Chuanmin Tao

Abstract:

The natural history of HBV infection could experience immune tolerant (IT), immune clearance (IC), HBeAg-negative inactive/quienscent carrier (ENQ), and HBeAg-negative hepatitis (ENH). As current biomarkers for discriminating these four phases have some weaknesses, additional serological indicators are needed. Hepatits B core-related antigen (HBcrAg) encoded with precore/core gene contains denatured HBeAg, HBV core antigen (HBcAg) and a 22KDa precore protein (p22cr), which was demonstrated to have a close association with natural history of hepatitis B infection, but no specific cutoff values and diagnostic parameters to evaluate the diagnostic efficacy. This study aimed to clarify the distribution of HBcrAg levels and evaluate its diagnostic performance during the natural history of infection from a Western Chinese perspective. 294 samples collected from treatment-naïve chronic hepatitis B (CHB) patients in different phases (IT=64; IC=72; ENQ=100, and ENH=58). We detected the HBcrAg values and analyzed the relationship between HBcrAg and HBV DNA. HBsAg and other clinical parameters were quantitatively tested. HBcrAg levels of four phases were 9.30 log U/mL, 8.80 log U/mL, 3.00 log U/mL, and 5.10 logU/mL, respectively (p < 0.0001). Receiver operating characteristic curve analysis demonstrated that the area under curves (AUCs) of HBcrAg and quantitative HBsAg at cutoff values of 9.25 log U/mL and 4.355 log IU/mL for distinguishing IT from IC phases were 0.704 and 0.694, with sensitivity 76.39% and 59.72%, specificity 53.13% and 79.69%, respectively. AUCs of HBcrAg and quantitative HBsAg at cutoff values of 4.15 log U/mlmL and 2.395 log IU/mlmL for discriminating between ENQ and ENH phases were 0.931 and 0.653, with sensitivity 87.93% and 84%, specificity 91.38% and 39%, respectively. Therefore, HBcrAg levels varied significantly among four natural phases of HBV infection. It had higher predictive performance than quantitative HBsAg for distinguishing between ENQ-patients and ENH-patients and similar performance with HBsAg for the discrimination between IT and IC phases, which indicated that HBcrAg could be a potential serological marker for CHB.

Keywords: chronic hepatitis B, hepatitis B core-related antigen, hepatitis B surface antigens, hepatitis B virus

Procedia PDF Downloads 385
2616 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 82
2615 Parasitic Infection among Farmers Dealing with Treated Wastewater in Al-Zaitoun Area, Gaza City

Authors: Haneen Nabil Al-Sbaihi, Adnan Al-Hindi, Khalid Qahman

Abstract:

Treated wastewater irrigation is associated with several benefits but can also lead to significant health risks. The main objective of this study is to investigate the parasitic infection (PI) among farmers dealing with treated wastewater (TWW) in Al-Zaitoun area- Gaza City. This study included two farmer groups: farmers who dealing with TWW (Mixed water users (MWUs)), and farmers who irrigate by using groundwater (GW) (Ground water users (GWUs)). Each participant was asked to provide stool samples on two phases. The two farmer groups were use GW in the 1st phase while the MWUs were use TWW in the 2nd phase which was after using TWW in irrigation for three months. Prevalence of PI was 30.9% and increased to be 47.3% in the 2nd phase. Negative association not statistically significant (OR= 0.659, CI 0.202-2.153)) was found in the 1st phase, while a positive association not statically significant was found between PI and TWWR in the 2nd phase (OR=1.37, CI 0.448-4.21). In this study six parasites species were identified among participants: Entamoeba ''histolytica/dispar and coil'', Cryptosporidium, Microsporidia, Giardia lamblia, Strongyloides stercoralis, and Ascaris lumbricoides.

Keywords: wastewater, groundwater, treated wastewater, parasitic infection, parasites

Procedia PDF Downloads 66
2614 Predictors of Sexually Transmitted Infection of Korean Adolescent Females: Analysis of Pooled Data from Korean Nationwide Survey

Authors: Jaeyoung Lee, Minji Je

Abstract:

Objectives: In adolescence, adolescents are curious about sex, but sexual experience before becoming an adult can cause the risk of high probability of sexually transmitted infection. Therefore, it is very important to prevent sexually transmitted infections so that adolescents can grow in healthy and upright way. Adolescent females, especially, have sexual behavior distinguished from that of male adolescents. Protecting female adolescents’ reproductive health is even more important since it is directly related to the childbirth of the next generation. This study, thus, investigated the predictors of sexually transmitted infection in adolescent females with sexual experiences based on the National Health Statistics in Korea. Methods: This study was conducted based on the National Health Statistics in Korea. The 11th Korea Youth Behavior Web-based Survey in 2016 was conducted in the type of anonymous self-reported survey in order to find out the health behavior of adolescents. The target recruitment group was middle and high school students nationwide as of April 2016, and 65,528 students from a total of 800 middle and high schools participated. The study was conducted in 537 female high school students (Grades 10–12) among them. The collected data were analyzed as complex sampling design using SPSS statistics 22. The strata, cluster, weight, and finite population correction provided by Korea Center for Disease Control & Prevention (KCDC) were reflected to constitute complex sample design files, which were used in the statistical analysis. The analysis methods included Rao-Scott chi-square test, complex samples general linear model, and complex samples multiple logistic regression analysis. Results: Out of 537 female adolescents, 11.9% (53 adolescents) had experiences of venereal infection. The predictors for venereal infection of the subjects were ‘age at first intercourse’ and ‘sexual intercourse after drinking’. The sexually transmitted infection of the subjects was decreased by 0.31 times (p=.006, 95%CI=0.13-0.71) for middle school students and 0.13 times (p<.001, 95%CI=0.05-0.32) for high school students whereas the age of the first sexual experience was under elementary school age. In addition, the sexually transmitted infection of the subjects was 3.54 times (p < .001, 95%CI=1.76-7.14) increased when they have experience of sexual relation after drinking alcohol, compared to those without the experience of sexual relation after drinking alcohol. Conclusions: The female adolescents had high probability of sexually transmitted infection if their age for the first sexual experience was low. Therefore, the female adolescents who start sexual experience earlier shall have practical sex education appropriate for their developmental stage. In addition, since the sexually transmitted infection increases, if they have sexual relations after drinking alcohol, the consideration for prevention of alcohol use or intervention of sex education shall be required. When health education intervention is conducted for health promotion for female adolescents in the future, it is necessary to reflect the result of this study.

Keywords: adolescent, coitus, female, sexually transmitted diseases

Procedia PDF Downloads 171
2613 Characterization of Human Papillomavirus Genotypes and Their Correlates among Women Living with HIV Attending Antiretroviral Therapy Clinic in Mukono, Uganda

Authors: Nantale Prossy Nabatte, Josephat Nyagero, Elizabeth Kemigisha

Abstract:

Background: Human Papilloma Virus (HPV) is a prevalent sexually transmitted infection (STI) in the world. It is important to screen for HPV so that women found positive receive early treatment to prevent the development of cervical cancer. The broad aim of the research was to explore the types, occurrence, and associated correlates of HPV infection by genotyping Human papillomavirus among a cohort of WLHIV attending an antiretroviral therapy clinic in Mukono, Uganda. Methods: A cross-sectional study was used to collect data for socio-demographic, sexual practices, and medical history factors associated with HPV genotypes using a pretested interview guide subjected to 342 WLHIV. The respondents’ results for HPV genotypes were obtained retrospectively from respective laboratory records. Data was entered in Epidata v4.6 and analysed using STATA V14. The prevalence of hr-HPV was estimated as a proportion of the entire sample size. Analysis for the correlates of hr-HPV infection was done using a modified Poisson regression model. Results: Slightly more than a half of respondents were aged below 35 years (56.7%), married (52.6%), and with a primary level of education (51.2%). The prevalence of hr-HPV was 39.8% at a 95% confidence interval (CI: 34.40- 44.78). The hr-HPV was higher among those between 30-34 years of age (n= 41, 30.2%) than those between the age of 45-49 years (n=16, 11.8%). In terms of associated correlates, age 45-49 years (aPR: 1.95, 95% CI: 1.41- 2.69), being married (aPR: 1.30, 95% CI: 1.00, 1.69), use of condoms (aPR: 1.31, 95% CI: 1.00 -1.71) and age of sexual debut (aPR: 1.42, 95% CI: 1.08-1.87) were significantly associated with Human papillomavirus genotypes. Conclusion and Recommendation: The prevalence of hr-HPV infection was high, indicative of a risk to the health of WLHIV in Mukono, Uganda, and worldwide at large. The correlates are age 45-49 years, being married, use of condoms, and age of sexual debut. Based on the results, it is recommended that the implementing teams in such projects put more emphasis on the diagnosis of hr-HPV infection and monitoring the treatment. More research is required to determine the effect of ART therapy on hr-HPV persistence.

Keywords: human papillomavirus genotypes, and their correlates, among women living with HIV, attending antiretroviral clinic

Procedia PDF Downloads 67
2612 Clinch Process Simulation Using Diffuse Elements

Authors: Benzegaou Ali, Brani Benabderrahmane

Abstract:

This work describes a numerical study of the TOX–clinching process using diffuse elements. A computer code baptized SEMA "Static Explicit Method Analysis" is developed to simulate the clinch joining process. The FE code is based on an Updated Lagrangian scheme. The used resolution method is based on an explicit static approach. The integration of the elasto-plastic behavior law is realized with an algorithm of Simo and Taylor. The tools are represented by plane facets.

Keywords: diffuse elements, numerical simulation, clinching, contact, large deformation

Procedia PDF Downloads 339