Search results for: malware infection propagating malicious code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2967

Search results for: malware infection propagating malicious code

2727 Role of Giardia lamblia Infection in the Pathogenesis of Gastritis in Patients with Dyspepsia

Authors: Aly Kassem, Eman A. Sabet, Hanaa A. El-Hady, Doha S. Mohamed, Abeer Sheneef, Mona Fattouh, Mamdouh M. Esmat

Abstract:

Objective: Giardia lamblia parasite is the most common protozoal infection in human. Concomitant Helecobacter Pylori (H. pylori) and Giardia lamblia infection is common for their similar mode of transmission and strong correlation to socioeconomic levels. Only few reports had described gastric giardiasis. Our aim was to detect H. pylori and Giardia in gastric antral mucosal biopsies from patients with dyspepsia. The impact of both pathogens on clinical, endoscopic and histopathogical changes was studied. Methods: 48 patients with dyspepsia (group1) and 28 control patients (patients undergoing esophagogastroduodenoscopy EGD for reasons other than dyspepsia), (group 2) were studied. Endoscopic data were reported and gastric biopsy specimens were obtained for subsequent PCR assay for both organisms and for histopathological and electron microscopic examination. Results: Endoscopic antral gastritis and duodenal lesions were found in both groups, however, they were significantly more frequently in group 1 (p= 0.002 and P= 0.0005 respectively). Esophageal lesions, nodular antral gastritis, gastric ulcers and superficial corpal gastritis were found only in group 1. PCR detected H. pylori infection in 58% Vs 64 % for group 1 and group 2 respectively (P: NS). Giardia infection was present in 67 % Vs 42 % for group 1 and group 2 respectively (P=0.0003, Odd ratio=2.6). Co-infection with H. pylori and Giardia was present in 33% of group 1 Vs 36% for group 2 (P:NS). Abnormal histologic findings were found in both groups, however, intestinal metaplasia was found in group 1 only. Cellular abnormalities in the form of cytoplasmic vacuoles, mitochondrial destruction or nuclear abnormalities were found by Electron microscopic study in infected subjects of both groups. Conclusion: H. pylori is not the only gastric pathogen in our community, gastric giardiasis is another pathogen. Its contribution might be a factor in persistent dyspepsia after H. pylori eradication.

Keywords: dyspepsia, gastritis, Giardia lamblia, H. pylori

Procedia PDF Downloads 274
2726 Prevalence Determination of Hepatitis D Virus Genotypes among HBsAg Positive Patients in Kerman Province of Iran

Authors: Khabat Barkhordari, Ali Mohammad Arabzadeh

Abstract:

Hepatitis delta virus (HDV) is a RNA virus that needs the function of hepatitis B virus (HBV) for its propagation and assembly. Infection by HDV can occur spontaneously with HBV infection and cause acute hepatitis or develop as secondary infection in HBV suffering patients. Based on genome sequence analysis, HDV has several genotypes which show broad geographic and diverse clinical features. The aim of current study is determine the prevalence of hepatitis delta virus genotype in patients with positive HBsAg in Kerman province of Iran. This cross-sectional study a total of 400 patients with HBV infection attending the clinic center of Besat from 2012 to 2014 were included. We carried out ELISA to detect anti-HDV antibodies. Those testing positive were analyzed further for HDV-RNA and for genotyping using restriction fragment length polymorphism (RFLP) and RT-nested PCR- sequencing. Among 400 patients in this study, 67 cases (16.75 %) were containing anti-HDV antibody which we found HDV RNA in just 7 (1.75%) serum samples. Analysis of these 7 positive HDV showed that all of them have genotype I. According to current study the HDV prevalence in Kerman is higher than the reported prevalence of 6.6% for Iran as a whole and clade 1 (genotype 1) is the predominant clade of HDV in Kerman.

Keywords: genotyping, hepatitis delta virus, molecular epidemiology, Kerman, Iran

Procedia PDF Downloads 263
2725 Evaluating of Turkish Earthquake Code (2007) for FRP Wrapped Circular Concrete Cylinders

Authors: Guler S., Guzel E., Gulen M.

Abstract:

Fiber Reinforced Polymer (FRP) materials are commonly used in construction sector to enhance the strength and ductility capacities of structural elements. The equations on confined compressive strength of FRP wrapped concrete cylinders is described in the 7th chapter of the Turkish Earthquake Code (TEC-07) that enter into force in 2007. This study aims to evaluate the applicability of TEC-07 on confined compressive strengths of circular FRP wrapped concrete cylinders. To this end, a large number of data on circular FRP wrapped concrete cylinders are collected from the literature. It is clearly seen that the predictions of TEC-07 on circular FRP wrapped the FRP wrapped columns is not same accuracy for different ranges of concrete strengths.

Keywords: Fiber Reinforced Polymer (FRP), concrete cylinders, Turkish Earthquake Code, earthquake

Procedia PDF Downloads 492
2724 Spectrum and Prevalence of Candida Infection in Diabetic Foot Ulcers

Authors: Seyed Reza Aghili, Tahereh Shokohi, Lotfollah Davoodi, Zahra Kashi, Azam Moslemi, Mahdi Abastabar, Iman Haghani, Sabah Mayahi, Asoudeh A.

Abstract:

Introduction: In diabetic foot ulcers, if fungal agents such as Candida species penetrate into the cutaneous or depth of ulcer, can increase the degree of the wound and cause Candia infection and make it more difficult to heal. Material & Methods: A cross-sectional study was performed on 100 diabetic foot ulcer patients in 2020 in Sari, Iran. patient's data and wound grade were recorded in a questionnaire. Candida infection was diagnosed with direct microscopic examination and culture of samples. Colony-PCR molecular method was used for ITS region of DNA and then PCR-RFLP with Msp1 enzyme and using HWP1 specific gene to determine species of Candida agent. Results: Of 100 patients, the mean age 62.1 ± 10.8 years, 95% type 2 diabetes, 83%>10 years duration diabetes, 59% male, 66%> poor education level, 99% married, 52% rural, 95% neuropathic symptoms, 88% using antibiotics, 69%HbA1C >9%, and mean ulcer degree 2.6±1.05 were. Candida infection was seen in 13% of the deep tissue of the wound and 7% cutaneous around the wound. The predominant Candida isolated was C. parapsilosis (71.5%), C .albicans (14.3%). Fungal infections caused by mold fungi were not detected. There was a statistically significant relationship between yeast infection and gender, rural, HbA1C and ulcer degree. Conclusion: Mycological evaluations often are ignored. Candida parapsilosis is the most common infectious agent in these patients and may require specific treatment. Therefore, more attention of physicians to Candida infections particularly, early diagnosis and effective treatment can help faster recovery and prevent amputation.

Keywords: diabetic foot ulcer, candida infection, risk factors, c. parapsilosis

Procedia PDF Downloads 162
2723 Early Versus Delayed Antiretroviral Therapy in HIV‐positive People with Tuberculosis

Authors: Mohhamed El Habib Labdouni

Abstract:

Introduction: Co-infection with VIH and tuberculosis poses one of the major ongoing challenges for global TB and AIDS prevention and control. The objective of this study is to raise the issue of the resurgence of TB, in People living with VIH supported in a referent center in western Algeria. Its epidemiological, clinical, biological and radiological new trends, and to compare the mortality rate between early and delayed ART. Methods: It was a prospective study, during 36 months from the 01st/01/2012 to 31st/12/2014, by identifying and analyzing cases of TB-VIH co-infection. Our population was devised in two groups/ early ART and delayed ART. The primary and secondary endpoints were analyzed with Kaplan-Meier curves and log-rank test the period of follow up, which was fixed at 300 weeks. Results: Sixty cases of co-infection TB -VIH were enrolled in our study: 78.3% had pulmonary tuberculosis associated with extra-pulmonary, 13.3% had only pulmonary tuberculosis and 08.3% presented strictly extra-pulmonary TB. The clinical particularity of this co-infection is the frequency of serious localization such us: pleural 23.3%, peritoneal 31.7%, and meningeal suffusion 13.3%.y-.biologicaly we notice the predominance both of pancytopenia and leucoanemia, hyponatremia in 38,6% and hypokalemia in 19,3%. By analyzing Kaplan-Meier survival curves, we notice that early ART initiation is associated with a significant reduction of all-cause mortality (p = 0,000), and we have identified several prognostic factors such as hypokalemia hyponatremia, leukocytosis thrombopenemia leucothrombopenia (p = 0,005). Conclusion: Our study confirms most of the results reported in the literature. Early ART initiation reduces the rate of all-cause mortality, despite the probability of the occurrence of TB-IRIS.

Keywords: TB-HIV co-infection, early ART, hyponatremia, extrapulmonary tuberculosis

Procedia PDF Downloads 159
2722 Dimensioning of Circuit Switched Networks by Using Simulation Code Based On Erlang (B) Formula

Authors: Ali Mustafa Elshawesh, Mohamed Abdulali

Abstract:

The paper presents an approach to dimension circuit switched networks and find the relationship between the parameters of the circuit switched networks on the condition of specific probability of call blocking. Our work is creating a Simulation code based on Erlang (B) formula to draw graphs which show two curves for each graph; one of simulation and the other of calculated. These curves represent the relationships between average number of calls and average call duration with the probability of call blocking. This simulation code facilitates to select the appropriate parameters for circuit switched networks.

Keywords: Erlang B formula, call blocking, telephone system dimension, Markov model, link capacity

Procedia PDF Downloads 567
2721 CFD Simulation for Air-Borne Infection Analysis in AII-Room

Authors: Young Kwon Yang, In Sung Kang, Jung Ha Hwang, Jin Chul Park

Abstract:

The present study is a foundational study for performance improvements on isolation wards to prevent proliferation of secondary infection of infectious diseases such as SARS, H1N1, and MERS inside hospitals. Accordingly, the present study conducted an analysis of the effect of sealing mechanisms and filling of openings on ensuring air tightness performance in isolation wards as well as simulation on air currents in improved isolation wards. The study method is as follows. First, previous studies on aerial infection type and mechanism were reviewed, and the review results were utilized as basic data of analysis on simulation of air current. Second, national and international legislations and regulations in relation to isolation wards as well as case studies on developed nations were investigated in order to identify the problems in isolation wards in Korea and improvement plans. Third, construction and facility plans were compared and analyzed between general and isolation wards focusing on large general hospitals in Korea, thereby conducting comparison and analysis on the performance and effects of air-tightness of general and isolation wards through CFD simulations. The study results showed that isolation wards had better air-tightness performance than that of general wards.

Keywords: AII Room, air-borne infection, CFD, computational fluid dynamics

Procedia PDF Downloads 246
2720 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 93
2719 On Some Properties of Maximal Prefix Codes

Authors: Nikolai Krainiukov, Boris Melnikov

Abstract:

We study the properties of maximal prefix codes. The codes have many applications in computer science, theory of formal languages, data processing and data classification. Practical application is based on the representation of the maximal prefix codes as a sequence of words in a specific order. Our approach to study uses finite state automata (so-called flower automata) for the representation of prefix codes. An important task is the decomposition of prefix codes into prime prefix codes (factors). We discuss the properties of such prefix code decompositions. A linear time algorithm is designed which find the prime decomposition. To verify the correctness of the proposed algorithms, we implemented a system computer algebra GAP.

Keywords: maximal prefix code, regular languages, flower automata, prefix code decomposing

Procedia PDF Downloads 46
2718 A Review of the Axial Capacity of Circular High Strength Concrete-Filled Steel Tube Columns

Authors: Mustafa Gülen, Eylem Güzel, Soner Guler

Abstract:

The concrete filled steel tube (CFST) columns are commonly used in construction applications such as high-rise buildings and bridges owing to its lots of remarkable benefits. The use of concrete filled steel tube columns provides large areas by reduction in cross-sectional area of columns. The main aim of this study is to examine the axial load capacities of circular high strength concrete filled steel tube columns according to Eurocode 4 (EC4) and Chinese Code (DL/T). The results showed that the predictions of EC4 and Chinese Code DL/T are unsafe for all specimens.

Keywords: concrete-filled steel tube column, axial load capacity, Chinese code, Australian Standard

Procedia PDF Downloads 384
2717 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 377
2716 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 135
2715 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 385
2714 Prevalence of SARS-CoV-2 Infection and Associated Risk Factors in Selected Health Facilities of Tigray, Ethiopia: Cross-Sectional Study Design, 2023

Authors: Weldegerima Gebremedhin Hagos

Abstract:

Background: The Coronavirus disease of 2019 (COVID-19) is a catastrophic emerging global health threat caused by the severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2). COVID-19 has a wide range of complications and sequels. It is devastating in developing countries, causing serious health and socioeconomic crises as a result of the increasingly overburdened healthcare system. Ethiopia reported the first case of SARS-CoV-2 on 13th March 2020, with community transmission ensuing by mid-May. The aim of this study was conducted to determine the prevalence of SARS-CoV-2 infection in Tigray, Ethiopia. Methods: Facility-based correctional study designs were used on a total of 380 study participants from March 2023 up to May 2023 in two general hospitals and one comprehensive specialized hospital in Tigray, Ethiopia. A pre-structured questionnaire was used to assess information regarding the socio-demographic, clinical data and other risk factors. A nasal swap was taken by trained health professionals, and the laboratory analysis was done by RT-PCR (quant studio 7-flex, applied biosystems) in Tigrai Health Research Institute and Mekelle University Medical Microbiology Research Laboratory. Result: The mean age of the study participants was 31 (SD+/-3.5) years, with 65% being male and 35% female. The overall seropositivity of sars-cov-2 among the study participants was 5.5%. The prevalence was higher in males (6.2%) than females which were (4.7%). Sars-cov-2 infection was significantly associated with a history of lack of vaccination (p-value 0.002). There was no significant association between seropositivity and demographic factors (P > 0.05). Conclusion: The seroprevalence of SARS-CoV-2 among the study participants is high. Those study participants with a previous history of vaccination have a low probability of developing COVID-19 infection. A low SARS-CoV-2 infection rate was recorded in those who frequently use masks.

Keywords: prevalence, SARS-CoV-2, infection, risk factors

Procedia PDF Downloads 23
2713 Effective Infection Control Measures to Prevent Transmission of Multi-Drug Resistant Organisms from Burn Transfer Cases in a Regional Burn Centre

Authors: Si Jack Chong, Chew Theng Yap, Wan Loong James Mok

Abstract:

Introduction: Regional burn centres face the spectra of introduced multi-drug resistant organisms (MDRO) from transfer patients resident in MDRO endemic countries. MDRO can cause severe nosocomial infection, which in massive burn patients, will lead to greater morbidity and mortality and strain the institution financially. We aim to highlight 4 key measures that have effectively prevented transmission of imported MDRO. Methods: A case of Candida auris (C. auris) from a massive burn patient transferred from an MDRO endemic country is used to illustrate the measures. C. auris is a globally emerging multi-drug resistant fungal pathogen causing nosocomial transmission. Results: Infection control measures used to mitigate the risk of outbreak from transfer cases are: (1) Multidisciplinary team approach involving Infection Control and Infectious Disease specialists early to ensure appropriate antibiotics use and implementation of barrier measures, (2) aseptic procedures for dressing change with strict isolation and donning of personal protective equipment in the ward, (3) early screening of massive burn patient from MDRO endemic region, (4) hydrogen peroxide vaporization terminal cleaning for operating theatres and rooms. Conclusion: The prevalence of air travel and international transfer to regional burn centres will need effective infection control measures to reduce the risk of transmission from imported massive burn patients. In our centre, we have effectively implemented 4 measures which have reduced the risks of local contamination. We share a recent case report to illustrate successful management of a potential MDRO outbreak resulting from transfer of massive burn patient resident in an MDRO endemic area.

Keywords: burns, burn unit, cross infection, infection control

Procedia PDF Downloads 123
2712 CNS Cryptococcoma in an Immunocompetent Adult from a Low Resource Setting: A Case Report

Authors: Ssembatya Joseph Mary

Abstract:

Introduction: Cryptococcal infection in the Central Nervous System (CNS) is frequently seen in human immunodeficiency virus (HIV) patients and others with low immunity as an opportunistic fungal infection. However, CNS cryptococcal granuloma (cryptococcoma) in immunocompetent patients is rare. We present a case of CNS cryptococcoma in an immunocompetent patient and review the literature to illustrate the diagnosis and treatment of such lesions. Case presentation: A 62-year-old, HIV-negative, immunocompetent female patient with no known chronic illness presented with 5 months history of a progressive headache associated with on and off episodic generalized tonic-clonic convulsions. She had been to several hospitals before she was referred to our center with a diagnosis of a brain tumor. Before referral and despite a negative CSF analysis result, she had received treatment for bacterial meningitis with no success. At Mbarara Regional Referral Hospital (MRRH), she had surgery with an excision biopsy which showed features consistent with cryptococcosis on histology. The patient had a successful adjuvant treatment with antifungal drugs following surgery. Conclusion: The diagnosis of a parasitic CNS infection, particularly cryptococcal infection mimicking neoplastic lesions in an immunocompetent patient, was unusual. Surgical management of such lesions from different reports has a bad outcome and management remains totally conservative.

Keywords: Cryptococcal meningitis, immunocompetent patient, Uganda, low resource setting

Procedia PDF Downloads 60
2711 Study on Flexible Diaphragm In-Plane Model of Irregular Multi-Storey Industrial Plant

Authors: Cheng-Hao Jiang, Mu-Xuan Tao

Abstract:

The rigid diaphragm model may cause errors in the calculation of internal forces due to neglecting the in-plane deformation of the diaphragm. This paper thus studies the effects of different diaphragm in-plane models (including in-plane rigid model and in-plane flexible model) on the seismic performance of structures. Taking an actual industrial plant as an example, the seismic performance of the structure is predicted using different floor diaphragm models, and the analysis errors caused by different diaphragm in-plane models including deformation error and internal force error are calculated. Furthermore, the influence of the aspect ratio on the analysis errors is investigated. Finally, the code rationality is evaluated by assessing the analysis errors of the structure models whose floors were determined as rigid according to the code’s criterion. It is found that different floor models may cause great differences in the distribution of structural internal forces, and the current code may underestimate the influence of the floor in-plane effect.

Keywords: industrial plant, diaphragm, calculating error, code rationality

Procedia PDF Downloads 115
2710 A Retrospective Study on the Spectrum of Infection and Emerging Antimicrobial Resistance in Type 2 Diabetes Mellitus

Authors: Pampita Chakraborty, Sukumar Mukherjee

Abstract:

People with diabetes mellitus are more susceptible to developing infections, as high blood sugar levels can weaken the patient's immune system defences. People with diabetes are more adversely affected when they get an infection than someone without the disease, because you have weakened immune defences in diabetes. People who have minimally elevated blood sugar levels experience worse outcomes with infections. Diabetic patients in hospitals do not necessarily have a higher mortality rate due to infections, but they do face longer hospitalisation and recovery times. A study was done in a tertiary care unit in eastern India. Patients with type 2 diabetes mellitus infection were recruited in the study. A total of 520 cases of Type 2 Diabetes Mellitus were recorded out of which 200 infectious cases was included in the study. All subjects underwent detailed history & clinical examination. Microbiological samples were collected from respective site of the infection for microbial culture and antibiotic sensitivity test. Out of the 200 infectious cases urinary tract infection(UTI) was found in majority of the cases followed by diabetic foot ulcer (DFU), respiratory tract infection(RTI) and sepsis. It was observed that Escherichia coli was the most commonest pathogen isolated from UTI cases and Staphylococcus aureus was predominant in foot ulcers followed by other organisms. Klebsiella pneumonia was the major organism isolated from RTI and Enterobacter aerogenes was commonly observed in patients with sepsis. Isolated bacteria showed differential sensitivity pattern against commonly used antibiotics. The majority of the isolates were resistant to several antibiotics that are usually prescribed on an empirical basis. These observations are important, especially for patient management and the development of antibiotic treatment guidelines. It is recommended that diabetic patients receive pneumococcal and influenza vaccine annually to reduce morbidity and mortality. Appropriate usage of antibiotics based on local antibiogram pattern can certainly help the clinician in reducing the burden of infections.

Keywords: antimicrobial resistance, diabetic foot ulcer, respiratory tract infection, urinary tract infection

Procedia PDF Downloads 319
2709 Comparison of Several Diagnostic Methods for Detecting Bovine Viral Diarrhea Virus Infection in Cattle

Authors: Azizollah Khodakaram- Tafti, Ali Mohammadi, Ghasem Farjanikish

Abstract:

Bovine viral diarrhea virus (BVDV) is one of the most important viral pathogens of cattle worldwide caused by Pestivirus genus, Flaviviridae family.The aim of the present study was to comparison several diagnostic methods and determine the prevalence of BVDV infection for the first time in dairy herds of Fars province, Iran. For initial screening, a total of 400 blood samples were randomly collected from 12 industrial dairy herds and analyzed using reverse transcription (RT)-PCR on the buffy coat. In the second step, blood samples and also ear notch biopsies were collected from 100 cattle of infected farms and tested by antigen capture ELISA (ACE), RT-PCR and immunohistochemistry (IHC). The results of nested RT-PCR (outer primers 0I100/1400R and inner primers BD1/BD2) was successful in 16 out of 400 buffy coat samples (4%) as acute infection in initial screening. Also, 8 out of 100 samples (2%) were positive as persistent infection (PI) by all of the diagnostic tests similarly including RT-PCR, ACE and IHC on buffy coat, serum and skin samples, respectively. Immunoreactivity for bovine BVDV antigen as brown, coarsely to finely granular was observed within the cytoplasm of epithelial cells of epidermis and hair follicles and also subcutaneous stromal cells. These findings confirm the importance of monitoring BVDV infection in cattle of this region and suggest detection and elimination of PI calves for controlling and eradication of this disease.

Keywords: antigen capture ELISA, bovine viral diarrhea virus, immunohistochemistry, RT-PCR, cattle

Procedia PDF Downloads 337
2708 Software Defect Analysis- Eclipse Dataset

Authors: Amrane Meriem, Oukid Salyha

Abstract:

The presence of defects or bugs in software can lead to costly setbacks, operational inefficiencies, and compromised user experiences. The integration of Machine Learning(ML) techniques has emerged to predict and preemptively address software defects. ML represents a proactive strategy aimed at identifying potential anomalies, errors, or vulnerabilities within code before they manifest as operational issues. By analyzing historical data, such as code changes, feature im- plementations, and defect occurrences. This en- ables development teams to anticipate and mitigate these issues, thus enhancing software quality, reducing maintenance costs, and ensuring smoother user interactions. In this work, we used a recommendation system to improve the performance of ML models in terms of predicting the code severity and effort estimation.

Keywords: software engineering, machine learning, bugs detection, effort estimation

Procedia PDF Downloads 46
2707 Performance Analysis of MIMO-OFDM Using Convolution Codes with QAM Modulation

Authors: I Gede Puja Astawa, Yoedy Moegiharto, Ahmad Zainudin, Imam Dui Agus Salim, Nur Annisa Anggraeni

Abstract:

Performance of Orthogonal Frequency Division Multiplexing (OFDM) system can be improved by adding channel coding (error correction code) to detect and correct the errors that occur during data transmission. One can use the convolution code. This paper presents performance of OFDM using Space Time Block Codes (STBC) diversity technique use QAM modulation with code rate 1/2. The evaluation is done by analyzing the value of Bit Error Rate (BER) vs. Energy per Bit to Noise Power Spectral Density Ratio (Eb/No). This scheme is conducted 256 sub-carrier which transmits Rayleigh multipath channel in OFDM system. To achieve a BER of 10-3 is required 30 dB SNR in SISO-OFDM scheme. For 2x2 MIMO-OFDM scheme requires 10 dB to achieve a BER of 10-3. For 4x4 MIMO-OFDM scheme requires 5 dB while adding convolution in a 4x4 MIMO-OFDM can improve performance up to 0 dB to achieve the same BER. This proves the existence of saving power by 3 dB of 4x4 MIMO-OFDM system without coding, power saving 7 dB of 2x2 MIMO-OFDM system without coding and significant power savings from SISO-OFDM system.

Keywords: convolution code, OFDM, MIMO, QAM, BER

Procedia PDF Downloads 364
2706 Simulations of a Jet Impinging on a Flat Plate

Authors: Reda Mankbadi

Abstract:

In this paper we explore the use of a second-order unstructured-grid, finite-volume code for direct noise prediction. We consider a Mach 1.5 jet impinging on a perpendicular flat plate. Hybrid LES-RANS simulations are used to calculate directly both the flow field and the radiated sound. The ANSYS Fluent commercial code is utilized for the calculations. The acoustic field is obtained directly from the simulations and is compared with the integral approach of Ffowcs Williams-Hawkings (FWH). Results indicate the existence of a preferred radiation angle. The spectrum obtained is in good agreement with observations. This points out to the possibility of handling the effects of complicated geometries on noise radiation by using unstructured second-orders codes.

Keywords: CFD, Ffowcs Williams-Hawkings (FWH), imping jet, ANSYS fluent commercial code, hybrid LES-RANS simulations

Procedia PDF Downloads 420
2705 Awareness about HIV-Infection among HIV-Infected Individuals Attending Medical Moscow Center, Russia

Authors: Marina Nosik, Irina Rymanova, Sergei Sevostyanihin, Natalya Sergeeva, Alexander Sobkin

Abstract:

This paper presents results of the survey regarding the awareness about HIV/AIDS among HIV-infected individuals. A questionnaire covering various aspects of HIV-infection was conducted among 110 HIV-infected individuals who attended the G.A. Zaharyan Moscow Tuberculosis Clinic, Department for the treatment of TB patients with HIV. The questionnaire included questions about modes of HIV transmission and preventive measures against HIV/AIDS, as well as questions about age, gender, education, and employment status. The survey revealed that the respondents in the whole had a good knowledge regarding modes of HIV transmission and preventive measures against HIV/AIDS: about 83,6% male respondents and 85,7% female respondents gave accurate answers regarding the HIV-infection. However, the overwhelming majority of the study participants, that is, 88,5% men and 98% women, was quite ignorant about the risk of acquiring HIV through saliva and toothbrush of HIV-infected individual. Though that risk is rather insignificant, it is still biologically possible. And this gap in knowledge needs to be filled. As the study showed another point of concern was the fact, that despite the knowledge of HIV transmission risk through unprotected sex about 40% percent of HIV-positive men and 25% of HIV-positive women did not insist on using condoms with their sexual partners. These findings indicate that there are still some aspects about HIV-infection which needed to be clarified and explained through more detailed and specific educational programmes.

Keywords: AIDS, HIV transmission risks, HIV misconceptions, risk behavior

Procedia PDF Downloads 307
2704 Using ALOHA Code to Evaluate CO2 Concentration for Maanshan Nuclear Power Plant

Authors: W. S. Hsu, S. W. Chen, Y. T. Ku, Y. Chiang, J. R. Wang , J. H. Yang, C. Shih

Abstract:

ALOHA code was used to calculate the concentration under the CO2 storage burst condition for Maanshan nuclear power plant (NPP) in this study. Five main data are input into ALOHA code including location, building, chemical, atmospheric, and source data. The data from Final Safety Analysis Report (FSAR) and some reports were used in this study. The ALOHA results are compared with the failure criteria of R.G. 1.78 to confirm the habitability of control room. The result of comparison presents that the ALOHA result is below the R.G. 1.78 criteria. This implies that the habitability of control room can be maintained in this case. The sensitivity study for atmospheric parameters was performed in this study. The results show that the wind speed has the larger effect in the concentration calculation.

Keywords: PWR, ALOHA, habitability, Maanshan

Procedia PDF Downloads 174
2703 A Comparative Study for the Axial Load Capacity of Circular High Strength CFST Columns

Authors: Eylem Guzel, Faruk Osmanoglu, Muhammet Kurucu

Abstract:

The concrete filled steel tube (CFST) columns are commonly used in construction applications such as high-rise buildings and bridges owing to its lots of remarkable benefits. The use of concrete-filled steel tube columns provides large areas by reduction in cross-sectional area of columns. The main aim of this study is to examine the axial load capacities of circular high strength concrete-filled steel tube columns according to Eurocode 4 (EC4) and Chinese Code (DL/T). The results showed that the predictions of EC4 and Chinese Code DL/T are unsafe for all specimens.

Keywords: concrete-filled steel tube column, axial load capacity, Chinese code, Australian standard

Procedia PDF Downloads 368
2702 The Primitive Code-Level Design Patterns for Distributed Programming

Authors: Bing Li

Abstract:

The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming.

Keywords: primitive APIs, primitive code-level design patterns, generic distributed programming, distributed systems, highly patterned development environment, messaging

Procedia PDF Downloads 150
2701 Long Wavelength Coherent Pulse of Sound Propagating in Granular Media

Authors: Rohit Kumar Shrivastava, Amalia Thomas, Nathalie Vriend, Stefan Luding

Abstract:

A mechanical wave or vibration propagating through granular media exhibits a specific signature in time. A coherent pulse or wavefront arrives first with multiply scattered waves (coda) arriving later. The coherent pulse is micro-structure independent i.e. it depends only on the bulk properties of the disordered granular sample, the sound wave velocity of the granular sample and hence bulk and shear moduli. The coherent wavefront attenuates (decreases in amplitude) and broadens with distance from its source. The pulse attenuation and broadening effects are affected by disorder (polydispersity; contrast in size of the granules) and have often been attributed to dispersion and scattering. To study the effect of disorder and initial amplitude (non-linearity) of the pulse imparted to the system on the coherent wavefront, numerical simulations have been carried out on one-dimensional sets of particles (granular chains). The interaction force between the particles is given by a Hertzian contact model. The sizes of particles have been selected randomly from a Gaussian distribution, where the standard deviation of this distribution is the relevant parameter that quantifies the effect of disorder on the coherent wavefront. Since, the coherent wavefront is system configuration independent, ensemble averaging has been used for improving the signal quality of the coherent pulse and removing the multiply scattered waves. The results concerning the width of the coherent wavefront have been formulated in terms of scaling laws. An experimental set-up of photoelastic particles constituting a granular chain is proposed to validate the numerical results.

Keywords: discrete elements, Hertzian contact, polydispersity, weakly nonlinear, wave propagation

Procedia PDF Downloads 178
2700 Statistical Characteristics of Code Formula for Design of Concrete Structures

Authors: Inyeol Paik, Ah-Ryang Kim

Abstract:

In this research, a statistical analysis is carried out to examine the statistical properties of the formula given in the design code for concrete structures. The design formulas of the Korea highway bridge design code - the limit state design method (KHBDC) which is the current national bridge design code and the design code for concrete structures by Korea Concrete Institute (KCI) are applied for the analysis. The safety levels provided by the strength formulas of the design codes are defined based on the probabilistic and statistical theory.KHBDC is a reliability-based design code. The load and resistance factors of this code were calibrated to attain the target reliability index. It is essential to define the statistical properties for the design formulas in this calibration process. In general, the statistical characteristics of a member strength are due to the following three factors. The first is due to the difference between the material strength of the actual construction and that used in the design calculation. The second is the difference between the actual dimensions of the constructed sections and those used in design calculation. The third is the difference between the strength of the actual member and the formula simplified for the design calculation. In this paper, the statistical study is focused on the third difference. The formulas for calculating the shear strength of concrete members are presented in different ways in KHBDC and KCI. In this study, the statistical properties of design formulas were obtained through comparison with the database which comprises the experimental results from the reference publications. The test specimen was either reinforced with the shear stirrup or not. For an applied database, the bias factor was about 1.12 and the coefficient of variation was about 0.18. By applying the statistical properties of the design formula to the reliability analysis, it is shown that the resistance factors of the current design codes satisfy the target reliability indexes of both codes. Also, the minimum resistance factors of the KHBDC which is written in the material resistance factor format and KCE which is in the member resistance format are obtained and the results are presented. A further research is underway to calibrate the resistance factors of the high strength and high-performance concrete design guide.

Keywords: concrete design code, reliability analysis, resistance factor, shear strength, statistical property

Procedia PDF Downloads 289
2699 An Investigation on Overstrength Factor (Ω) of Reinforced Concrete Buildings in Turkish Earthquake Draft Code (TEC-2016)

Authors: M. Hakan Arslan, I. Hakkı Erkan

Abstract:

Overstrength factor is an important parameter of load reduction factor. In this research, the overstrength factor (Ω) of reinforced concrete (RC) buildings and the parameters of Ω in TEC-2016 draft version have been explored. For this aim, 48 RC buildings have been modeled according to the current seismic code TEC-2007 and Turkish Building Code-500-2000 criteria. After modelling step, nonlinear static pushover analyses have been applied to these buildings by using TEC-2007 Section 7. After the nonlinear pushover analyses, capacity curves (lateral load-lateral top displacement curves) have been plotted for 48 RC buildings. Using capacity curves, overstrength factors (Ω) have been derived for each building. The obtained overstrength factor (Ω) values have been compared with TEC-2016 values for related building types, and the results have been interpreted. According to the obtained values from the study, overstrength factor (Ω) given in TEC-2016 draft code is found quite suitable.

Keywords: reinforced concrete buildings, overstrength factor, earthquake, static pushover analysis

Procedia PDF Downloads 332
2698 Prevalence of Eimeria spp in Cattle in Anatolia Region, Turkey

Authors: Nermin Isik, Onur Ceylan

Abstract:

Bovine coccidiosis is a protozoan infection caused by coccidia parasites of the genus Eimeria which develops in the small and the large intestine. The aim of this study was to determine the prevalence of Eimeria spp. in cattle. This study was conducted between March 2014 and April 2015, involved 624 fecal samples of cattle. Cattle were grouped according to their age as follows: 6-12, 12-24 and >24 months. In a retrospective study from these faecal samples of cattle submitted to the University of Selcuk, Faculty of Veterinary Medicine, Laboratory of Parasitology were evaluated regarding the prevalence of Eimeria spp. In the laboratory, faecal samples were examined by Fulleborn saturated salt flotation technique and examined under a microscope for the presence of protozoan oocysts. Eimeria oocysts were found in 4.8% of all the samples. Eimeria infection was detected in 11.8%, 5.3% and 0.4% of the cattle in the age groups, respectively. This study showed that Eimeria infection was commonly seen in 6-24-month-old cattle. Further epidemiological investigation on economic significance and species composition of bovine coccidiosis needs to be pursued.

Keywords: cattle, diarrhea, Eimeria spp, Turkey

Procedia PDF Downloads 317