Search results for: renal access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3485

Search results for: renal access

3365 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell

Authors: Nawang Chhunid, Gagnesh Kumar

Abstract:

On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.

Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation

Procedia PDF Downloads 282
3364 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 514
3363 Elevated Creatinine Clearance and Normal Glomerular Filtration Rate in Patients with Systemic Lupus erythematosus

Authors: Stoyanka Vladeva, Elena Kirilova, Nikola Kirilov

Abstract:

Background: The creatinine clearance is a widely used value to estimate the GFR. Increased creatinine clearance is often called hyperfiltration and is usually seen during pregnancy, patients with diabetes mellitus preceding the diabetic nephropathy. It may also occur with large dietary protein intake or with plasma volume expansion. Renal injury in lupus nephritis is known to affect the glomerular, tubulointerstitial, and vascular compartment. However high creatinine clearance has not been found in patients with SLE, Target: Follow-up of creatinine clearance values in patients with systemic lupus erythematosus without history of kidney injury. Material and methods: We observed the creatinine, creatinine clearance, GFR and dipstick protein values of 7 women (with a mean age of 42.71 years) with systemic lupus erythematosus. Patients with active lupus have been monthly tested in the period of 13 months. Creatinine clearance has been estimated by Cockcroft-Gault Equation formula in ml/sec. GFR has been estimated by MDRD formula (The Modification of Diet in renal Disease) in ml/min/1.73 m2. Proteinuria has been defined as present when dipstick protein > 1+.Results: In all patients without history of kidney injury we found elevated creatinine clearance levels, but GFRremained within the reference range. Two of the patients were in remission while the other five patients had clinically and immunologically active Lupus. Three of the patients had a permanent presence of high creatinine clearance levels and proteinuria. Two of the patients had periodically elevated creatinine clearance without proteinuria. These results show that kidney disturbances may be caused by the vascular changes typical for SLE. Glomerular hyperfiltration can be result of focal segmental glomerulosclerosis caused by a reduction in renal mass. Probably lupus nephropathy is preceded not only by glomerular vascular changes, but also by tubular vascular changes. Using only the GFR is not a sufficient method to detect these primary functional disturbances. Conclusion: For early detection of kidney injury in patients with SLE we determined that the follow up of creatinine clearance values could be helpful.

Keywords: systemic Lupus erythematosus, kidney injury, elevated creatinine clearance level, normal glomerular filtration rate

Procedia PDF Downloads 245
3362 Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology

Authors: Peristera Baziana

Abstract:

In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration.

Keywords: access algorithm, channels division, collisions avoidance, wavelength division multiplexing

Procedia PDF Downloads 264
3361 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth

Authors: Hui-Chuan Lu

Abstract:

In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.

Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster

Procedia PDF Downloads 337
3360 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations

Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz

Abstract:

Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.

Keywords: digital divide, ICTs, inequality, education, life trajectories

Procedia PDF Downloads 242
3359 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 394
3358 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 338
3357 Toxicity of Cymbopogon proximus (Maharaib) Oil Extract to Newzealand Rabbits

Authors: A. B. Amna, M. A. E. Samia, A. K. Hassan

Abstract:

The clinical, pathological, hematological and biological changes in Newzealand rabbits groups given daily oral doses of 0.1,0.25 and 0.5 ml/kg body weight/day of Cpmbopogon proximus oil extract were investigated in an experiment durated for 21 days. Other than the dose co-related mortality rates, the clinical signs were observed daily after dosing to be low appetite and nervous signs including restlessness and increased consciousness. Pulmonary excretion of the oil extract led to bloody spots on the lungs, lymphocyte infiltration, congestion and edema. Renal glumeruli manifested lymphocyte infiltration in addition to shrinkages and easinophilic material in the medulla, if considered with the corticomedullary generalized necrosis and the significant changes in urea, they can explain the renal dysfunction. Hepatic malfunction was manifested by significant changes in serum alkaline phosphatase and aspartate transferases accompanied by the congested, fatty changed livers. The direct physical effect of the extracted oil was detected by the catarrhal inflammation of the intestines.There was no significant haematological change except for the slight changes in RBCs and MCVs in rabbits given the highest dose. Future work for Cpmbopogon proximus oil extract was forwarded and practical implications of the result were highlighted.

Keywords: toxicity, cymbopogon proximus (maharaib), oil extract, Newzealand rabbits

Procedia PDF Downloads 451
3356 Walls, Barriers, and Fences to Informal Political Economy of Land Resource Accesses: A Case of Banyabunagana Along with Uganda–Congo Border, South Western Uganda, Kisoro District

Authors: Niringiye Fred

Abstract:

Banyabunagana has always had access to land resources for grazing animals, sand mining, and farmland across the border in the Democratic Republic of Congo during the pre-colonial and colonial times, usually on an informal arrangement facilitated by kinship ties and rent transactions for these resources. However, in recent periods, the government of the Democratic Republic of the Congo (DRC) has been pursuing a policy of constructing barriers such as walls and fences so that Banyabunagana communities do not access the land on the DRC side of the border. This is happening in the background of increased and intensified demand for land use on the side of the Ugandan community. This paper will attempt to discuss the reasons behind the construction of walls, fences, and other barriers which deny access to land for Banyabunagana communities in Bunagana Parish, Muramba Sub-county- Kisoro district, Uganda. The research will attempt to answer the following main questions, among others, whether there are the factors that explain the construction of walls and fences which could limit or deny access to the informal use of land and other resources and whether policy options to ensure continued access to land and other resources for local communities.

Keywords: border, walls, fences, land resource access

Procedia PDF Downloads 82
3355 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 243
3354 The Probability of Smallholder Broiler Chicken Farmers' Participation in the Mainstream Market within Maseru District in Lesotho

Authors: L. E. Mphahama, A. Mushunje, A. Taruvinga

Abstract:

Although broiler production does not generate any large incomes among the smallholder community, it represents the main source of livelihood and part of nutritional requirement. As a result, market for broiler meat is growing faster than that of any other meat products and is projected to continue growing in the coming decades. However, the implication is that a multitude of factors manipulates transformation of smallholder broiler farmers participating in the mainstream markets. From 217 smallholder broiler farmers, socio-economic and institutional factors in broiler farming were incorporated into Binary model to estimate the probability of broiler farmers’ participation in the mainstream markets within the Maseru district in Lesotho. Of the thirteen (13) predictor variables fitted into the model, six (6) variables (household size, number of years in broiler business, stock size, access to transport, access to extension services and access to market information) had significant coefficients while seven (7) variables (level of education, marital status, price of broilers, poultry association, access to contract, access to credit and access to storage) did not have a significant impact. It is recommended that smallholder broiler farmers organize themselves into cooperatives which will act as a vehicle through which they can access contracts and formal markets. These cooperatives will also enable easy training and workshops for broiler rearing and marketing/markets through extension visits.

Keywords: broiler chicken, mainstream market, Maseru district, participation, smallholder farmers

Procedia PDF Downloads 118
3353 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 95
3352 Programming Language Extension Using Structured Query Language for Database Access

Authors: Chapman Eze Nnadozie

Abstract:

Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.

Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table

Procedia PDF Downloads 160
3351 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 272
3350 Nephroprotective Effect of Asparagus falcatus Leaf Extract on Adriamycin Induced Nephrotoxicity in Wistar Rats: A Dose Response Study

Authors: A. M. S. S. Amarasiri, A. P. Attanayake, K. A. P. W. Jayatilaka, L. K. B. Mudduwa

Abstract:

Adriamycin (ADR) is an effective anthracyclin antitumor drug, but its clinical use is limited due to renal toxicity. The leaves of Asparagus falcatus (Family: Liliaceae) have been used in the management of renal diseases since antiquity. In the present investigation, the aqueous leaf extract of A. falcatus was evaluated for acute nephroprotective activity in ADR induced nephrotoxic rats. Nephrotoxicity was induced in healthy male Wistar rats by intraperitoneal administration of ADR 20 mg/kg. The lyophilized powder of the aqueous refluxed (4h) leaf extract of A. falcatus was administered orally at three selected doses; 200, 400 and 600 mg/kg for three consecutive days. Fosinopril sodium (0.09 mg/kg) was used as the standard drug. Administration of the plant extract and the standard drug was commenced 24 hours after the induction of nephrotoxicity to rats. The nephroprotective effect was determined by selected biochemical parameters and by the assessment of histopathology on H and E stained kidney sections. The results were compared to a group of control rats with ADR induced nephrotoxicity. A group of rats administered with the equivalent volume of normal saline served as the healthy control. Administration of ADR 20 mg/kg produced a significant increase in the concentrations of serum creatinine (61%) and urine protein (73%) followed by a significant decrease in serum total protein (21%) and albumin (44%) of the plant extract treated animals compared to the healthy control group (p < 0.05). The aqueous extract of Asparagus falcatus at the three doses; 200, 400 and 600 mg/kg and the standard drug were found to decrease the elevation of concentrations of serum creatinine (33%, 51%, 54% and 42%) and urine protein (8%, 63%, 80% and 86%) respectively. The serum concentrations of total protein (12%, 17%, 29% and 12%) and albumin (3%, 17%, 17% and 16%) were significantly increased compared to the nephrotoxic control group respectively. Assessment of histopathology on H and E stained kidney sections demonstrated that ADR induced renal injury, as evidenced by loss of brush border, cytoplasmic vacuolization, pyknosis in renal tubular epithelial cells, haemorrhages, glomerular congestion and presence of hyaline casts. Treatment with the plant extract and the standard drug resulted in attenuation of the morphological destruction in rats. The results of the present study revealed that the aqueous leaf extract of A. falcatus possesses significant nephroprotective activity against adriamycin induced acute nephrotoxicity. The improved kidney functions were supported with the results of selected biochemical parameters and histological changes observed on H and E stained sections of the kidney tissues in Wistar rats.

Keywords: adriamycin induced nephrotoxicity, asparagus falcatus, biochemical assessment, histopathological assessment, nephroprotective activity

Procedia PDF Downloads 137
3349 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 299
3348 The Assessment of Nephrotoxic Effects of Peganum Harmala In Rat

Authors: Amal Yamani, Jaber Elgtou, Aziz Mohammed, Lazaar Jamila, Elachouri Mostafa

Abstract:

Peganum harmala used traditionally as an emenagogue and abortifacient agent in Morocco phytotherapy. Even thought its benefits effects, Peganum harmala remained severely toxic for the organism especially in strong doses. The present study was initiated to evaluate the nephrotoxic effects of aqueous extract of Peganum harmala seeds (PHS). The solution containing aqueous extract of PHS was administered orally by gavage at the dose of 2g/kg body weight during twenty days. Rats were used in this study, two groups were considered, a treated group received an extract of PHS at dose 2g/kg bodyweight and control group received an amount of tap water equivalent to the volume of the vehicle used for the dose of PHS extract. The data we collected showed that aqueous extracts of PHS administered during twenty days induced a significant changes in renal function expressed in decreases of diuresis (from 10 ± 0,58 to 5,33 ± 0,33 ml/24 hours) and the same profile for mean arterial blood pressure (from 125 ± 2,89 to 96,67 ± 6,01 mmHg). The histopathological study showed an alteration of kidney cells in treated group with regard the control group which is not affected. In conclusion: our results indicate that the aqueous extract of PHS induces toxicity may affect severely kidney function and causes renal histopathology.

Keywords: peganum harmala seeds, nephrotoxic, diuresi, histpathology, kidney

Procedia PDF Downloads 271
3347 Influence of Spirituality on Health Outcomes and General Well-Being in Patients with End-Stage Renal Disease

Authors: Ali A Alshraifeen, Josie Evans, Kathleen Stoddart

Abstract:

End-stage renal disease (ESRD) introduces physical, psychological, social, emotional and spiritual challenges into patients’ lives. Spirituality has been found to contribute to improved health outcomes, mainly in the areas of quality of life (QOL) and well-being. No studies exist to explore the influence of spirituality on the health outcomes and general well-being in patients with end-stage renal disease receiving hemodialysis (HD) treatment in Scotland. This study was conducted to explore spirituality in the daily lives of among these patients and how it may influence their QOL and general well-being. The study employed a qualitative method. Data were collected using semi-structured interviews with a sample of 21 patients. A thematic approach using Framework Analysis informed the qualitative data analysis. Participants were recruited from 11 dialysis units across four Health Boards in Scotland. The participants were regular patients attending the dialysis units three times per week. Four main themes emerged from the qualitative interviews: ‘Emotional and Psychological Turmoil’, ‘Life is Restricted’, ‘Spirituality’ and ‘Other Coping Strategies’. The findings suggest that patients’ QOL might be affected because of the physical challenges such as unremitting fatigue, disease unpredictability and being tied down to a dialysis machine, or the emotional and psychological challenges imposed by the disease into their lives such as wholesale changes, dialysis as a forced choice and having a sense of indebtedness. The findings also revealed that spirituality was an important coping strategy for the majority of participants who took part in the qualitative component (n=16). Different meanings of spirituality were identified including connection with God or Supernatural Being, connection with the self, others and nature/environment. Spirituality encouraged participants to accept their disease and offered them a sense of protection, instilled hope in them and helped them to maintain a positive attitude to carry on with their daily lives, which may have had a positive influence on their health outcomes and general well-being. The findings also revealed that humor was another coping strategy that helped to diffuse stress and anxiety for some participants and encouraged them to carry on with their lives. The findings from this study provide a significant contribution to a very limited body of work. The study contributes to our understanding of spirituality and how people receiving dialysis treatment use it to manage their daily lives. Spirituality is of particular interest due to its connection with health outcomes in patients with chronic illnesses. The link between spirituality and many chronic illnesses has gained some recognition, yet the identification of its influence on the health outcomes and well-being in patients with ESRD is still evolving. There is a need to understand patients’ experiences and examine the factors that influence their QOL and well-being to ensure that the services available are adequately tailored to them. Hence, further research is required to obtain a better understanding of the influence of spirituality on the health outcomes and general well-being of patients with ESRD.

Keywords: end-stage renal disease, general well-being, quality of life, spirituality

Procedia PDF Downloads 199
3346 Compliance Of Dialysis patients With Nutrition Guidelines: Insights From A Questionnaire

Authors: Zeiler M., Stadler D., Schmaderer C.

Abstract:

Over the years of dialysis treatment, most patients experience significant weight loss. The primary emphasis in earlier research was the underlying mechanism of protein energy wasting and the subsequent malnutrition inflammation syndrome. In the interest to provide an effective and rapid solution for the patients, the aim of this study is identifying individual influences of their assumed reduced dietary intake, such as nausea, appetite loss and taste changes, and to determine whether the patients adhere to their nutrition guidelines. A prospective, controlled study with 38 end-stage renal disease patients was performed using a questionnaire to reflect their diet within the last 12 months. Thereby, the daily intake for the most important macro-and micronutrients was calculated to be compared with the individual KDQOI-guideline value, as well as controls matched in age and gender. The majority of the study population did not report symptoms commonly associated with dialysis, such as nausea or inappetence, and denied any change in dietary behavior since receiving renal replacement therapy. The patients’ daily intake of energy (3080kcal ± 1266) and protein (89,9g [53,4-142,0]) did not differ significantly from the controls (energy intake: 3233kcal ± 1046, p=0,597; protein intake: 103,7g [90,1-125,5], p=0,120). The average difference to the individual calculated KDQOI-guideline was +176,0kcal ± 1156 (p=0,357) for energy intake and -1,75g ± 45,9 (p=0,491) for protein intake. However, there was an observed imbalance in the distribution of macronutrients, with a preference for fats over proteins. The patients’ daily intake of sodium (5,4g [ 2,95-10,1]) was higher than in the controls (4,1g [2,04-5,99], p= 0,058) whereas both values for potassium (3,7g ± 1,84) and phosphorous (1,79g ± 0,91) went significantly below the controls’ values (potassium intake: 4,89g ± 1,74, p=0,014; phosphorous intake: 2,04g ± 0,64, p=0,038). Thus, the values exceeded the calculated KDQOI-recommendation by + 3,3g [0,63-7,90] (p<0,001) for sodium, +1,49g ± 1,84 (p<0,001) for potassium and +0,89g ± 0,91 (p<0,001) for phosphorous. Contrary to the assumption, the patients did not under-eat. Nevertheless, their diets did not align with the recommended values. These findings highlight the need for intervention and education among patients and that regular dietary monitoring could prevent unhealthy nutrition habits. The elaboration of individual references instead of standardized guidelines could increase the compliance to the advised diet so that interdisciplinary comorbidities do not develop or worsen.

Keywords: compliance, dialysis, end-stage renal disease, KDQOI, malnutrition, nutrition guidelines, questionnaire, salt intake

Procedia PDF Downloads 44
3345 The Access to the City in the Medellín Urban Experience

Authors: Mansilla, Juan Camilo

Abstract:

According to many studies, public space in the cities of Global South is constantly morcellated and captured by a multiplicity of actors in a permanent struggle for power. This imposed public space restricts the access to services and political actions to many inhabitants. The author has conducted several focus group sessions using video in a reflective mode with low-income communities in Medellín, Colombia in order to study how people in this city are shift from a physical public space to a hybrid public space shaped by internet. Beyond the fragmented city and the violent urban context manifested by participants, these activities have highlighted how the access to the city is currently going through a dialectic movement between the physical and the digital space. The purpose of this article is to make explicit the link between this hybrid public space and the boundaries of exclusion in the city. Urban marginality is closely related with the idea of access and space. Low-income communities in Medellín assume the digital realm like a “not controlled space” of resistance, where alternative ways of expression like hip hop movement, graffiti, dance, video and virtual communities produce effective changes in the physical realm.

Keywords: access to the city, hybrid public space, low-income communities, Medellín, urban marginality

Procedia PDF Downloads 452
3344 People Experiencing Economic Disadvantages and Access to Justice System: The Case of Unemployed People in Australia

Authors: M. Shahadat Hossain

Abstract:

People experiencing economic disadvantages have limited access to justice system. Employment status is a key indicator of economic disadvantage. There is a link between employment status and vulnerability to legal problems. This paper addresses the obstacles unemployed people experience to secure justice in Australia. This paper further explores exiting services for economically disadvantaged people to secure justice where these unemployment people can get access. It reveals that unemployed people are vulnerable to multifaced crime and violence. Due to high cost of legal services, these unemployed people are unable to afford legal services to access justice. They are often found higher levels of nonactions in terms of access to justice also due to lack of their initiatives. This paper further reveals that legal aid commissions are state and territory statutory agencies in Australia which provide free legal information, advice, duty lawyers, and legal representation services. Community legal centres are independent, non-profit government organizations with a focus of early advice, problem solving, and working with other agencies to address connected, financial, and health problems. Moreover, the private profession helps people who cannot afford to pay for a lawyer in several ways. But there are problems of shortage of funding for these legal services and making available to economically disadvantaged people. However, this paper argues that people experiencing long-term unemployment face barriers to secure justice due to their economic disadvantages. It further argues that services available for them to access to justice is inadequate.

Keywords: economic disadvantages, unemployment, access to justice, Australia

Procedia PDF Downloads 104
3343 Bridge Healthcare Access Gap with Artifical Intelligence

Authors: Moshmi Sangavarapu

Abstract:

The US healthcare industry has undergone tremendous digital transformation in recent years, but critical care access to lower-income ethnicities is still in its nascency. This population has historically showcased substantial hesitation to seek any medical assistance. While the lack of sufficient financial resources plays a critical role, the existing cultural and knowledge barriers also contribute significantly to widening the access gap. It is imperative to break these barriers to ensure timely access to therapeutic procedures that can save important lives! Based on ongoing research, healthcare access barriers can be best addressed by tapping the untapped potential of caregiver communities first. They play a critical role in patients’ diagnoses, building healthcare knowledge and instilling confidence in required therapeutic procedures. Recent technological advancements have opened many avenues by developing smart ways of reaching the large caregiver community. A digitized go-to-market strategy featuring connected media coupled with smart IoT devices and geo-location targeting can be collectively leveraged to reach this key audience group. AI/ML algorithms can be thoroughly trained to identify relevant data signals from users' location and browsing behavior and determine useful marketing touchpoints. The web behavior can be further assimilated with natural language processing to identify contextually relevant interest topics and decipher potential caregivers on digital avenues to serve that brand message. In conclusion, grasping the true health access journey of any lower-income ethnic group is important to design beneficial touchpoints that can alleviate patients’ concerns and allow them to break their own access barriers and opt for timely and quality healthcare.

Keywords: healthcare access, market access, diversity barriers, patient journey

Procedia PDF Downloads 22
3342 Factors Affecting Households' Decision to Allocate Credit for Livestock Production: Evidence from Ethiopia

Authors: Kaleb Shiferaw, Berhanu Geberemedhin, Dereje Legesse

Abstract:

Access to credit is often viewed as a key to transform semi-subsistence smallholders into market oriented producers. However, only a few studies have examined factors that affect farmers’ decision to allocate credit on farm activities in general and livestock production in particular. A trivariate probit model with double selection is employed to identify factors that affect farmers’ decision to allocate credit on livestock production using data collected from smallholder farmers in Ethiopia. After controlling for two sample selection bias – taking credit for the production season and decision to allocate credit on farm activities – land ownership and access to a livestock centered extension service are found to have a significant (p<0.001) effect on farmers decision to use credit for livestock production. The result showed farmers with large land holding, and access to a livestock centered extension services are more likely to utilize credit for livestock production. However since the effect of land ownership squared is negative the effect of land ownership for those who own a large plot of land lessens. The study highlights the fact that improving access to credit does not automatically translate into more productive households. Improving farmers’ access to credit should be followed by a focused extension services.

Keywords: livestock production, credit access, credit allocation, household decision, double sample selection

Procedia PDF Downloads 294
3341 Digital Repositories in Algerian Universities: Content and Search Possibilities

Authors: Hakim Benoumelghar

Abstract:

The launch in 1999 of the open access Initiative (OAI) and the protocol for sharing metadata, OAI-PMH, in parallel with the provision of deposit platforms, open-source software, such as DSpace in 2002, which allow libraries to develop digital repositories and play a leading role in the open access movement, and by building institutional open archives alongside the theme. This study focuses on Algerian universities and their projects and platforms for digital repositories of theses and scientific papers and the possibilities of access to the university community to develop research and access to archives of scientific digital content offered by the scientific community. This contribution attempts to compare Algerian and foreign institutional deposits in developed countries in order to have development and perspectives to facilitate scientific research and give more possibilities to the scientific community in documentary matters.

Keywords: digital repository, repository software, university, algeria

Procedia PDF Downloads 38
3340 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 119
3339 Association of AGT (M268T) Gene Polymorphism in Diabetes and Nephropathy in Pakistan

Authors: Syed M. Shahid, Rozeena Shaikh, Syeda N. Nawab, Abid Azhar

Abstract:

Diabetes mellitus (DM) is a prevalent non-communicable disease worldwide. DM may lead to many vascular complications like hypertension, nephropathy, retinopathy, neuropathy and foot infections. Pathogenesis of diabetic nephropathy (DN) is implicated by the polymorphisms in genes encoding the specific components of renin angiotensin aldosterone system (RAAS) which include angiotensinogen (AGT), angiotensin-II receptor and angiotensin converting enzyme (ACE) genes. This study was designed to explore the possible association of AG (M268T) polymorphism in the patients of diabetes and nephropathy in Pakistan. Study subjects included 100 controls, 260 diabetic patients without renal insufficiency and 190 diabetic nephropathy patients with persistent albuminuria. Fasting blood samples were collected from all the subjects after getting institutional ethical approval and informed consent. The biochemical estimations, PCR amplification and direct sequencing for the specific region of AGT gene was carried out. A significantly high frequency of TT genotype and T allele of AGT (M268T) was observed in the patients of diabetes with nephropathy as compared to controls and diabetic patients without any known renal impairment. The TT genotype and T allele of AGT (M268T) polymorphism may be considered as a genetic risk factor for the development and progression of nephropathy in diabetes. Further cross sectional population studies would be of help to establish and confirm the observed possible association of AGT gene variations with development of nephropathy in diabetes.

Keywords: RAAS, AGT (M268T), diabetes, nephropathy

Procedia PDF Downloads 500
3338 Correlation between Microalbuminuria and Hypertension in Type 2 Diabetic Patients

Authors: Alia Ali, Azeem Taj, Muhammed Joher Amin, Farrukh Iqbal, Zafar Iqbal

Abstract:

Background: Hypertension is commonly found in patients with Diabetic Kidney Disease (DKD). Microalbuminuria is the first clinical sign of involvement of kidneys in patients with type 2 diabetes. Uncontrolled hypertension induces a higher risk of cardiovascular events, including death, increasing proteinuria and progression to kidney disease. Objectives: To determine the correlation between microalbuminuria and hypertension and their association with other risk factors in type 2 diabetic patients. Methods: One hundred and thirteen type 2 diabetic patients were screened for microalbuminuria and raised blood pressure, attending the diabetic clinic of Shaikh Zayed Hospital, Lahore, Pakistan. The study was conducted from November 2012 to June 2013. Results: Patients were divided into two groups. Group 1, those with normoalbuminuria (n=63) and Group 2, those having microalbuminuria (n=50). Group 2 patients showed higher blood pressure values as compared to Group 1. The results were statistically significant and showed poor glycemic control as a contributing risk factor. Conclusion: The study concluded that there is high frequency of hypertension among type 2 diabetics but still much higher among those having microalbuminuria. So, early recognition of renal dysfunction through detection of microalbuminuria and to start treatment without any delay will confer future protection from end-stage renal disease as well as hypertension and its complications in type 2 diabetic patients.

Keywords: hypertension, microalbuminuria, diabetic kidney disease, type 2 Diabetes mellitus

Procedia PDF Downloads 368
3337 Two Cases of VACTERL Association in Pregnancy with Lymphocyte Therapy

Authors: Seyed Mazyar Mortazavi, Masod Memari, Hasan Ali Ahmadi, Zhaleh Abed

Abstract:

Introduction: VACTERL association is a rare disorder with various congenital malformations. The aetiology remains unknown. Combination of at least three congenital anomalies of the following criteria is required for diagnosis: vertebral defects, anal atresia, cardiac anomalies, tracheo-esophageal fistula, renal anomalies, and limb defects. Case presentation: The first case was 1-day old male neonate with multiple congenital anomalies was bore from 28 years old mother. The mother had history of pregnancy with lymphocyte therapy. His anomalies included: defects in thoracic and lumbar vertebral, anal atresia, bilateral hydronephrosis, atrial septal defect, and lower limb abnormality. Other anomalies were cryptorchidism and nasal canal narrowing. The second case was born with 32 weeks gestational age from mother with history of pregnancy with lymphocyte therapy. He had thoracic vertebral defect, cardiac anomalies and renal defect. Conclusion: diagnosis based on clinical finding is VACTERL association. Early diagnosis is very important to investigation and treatment of other coexistence anomalies. VACTERL association in mothers with history of pregnancy with lymphocyte therapy has suggested possibly of relationship between VACTERL association and this method of pregnancy.

Keywords: anal atresia, tracheo-esophageal fistula, atrial septal defect, lymphocyte therapy

Procedia PDF Downloads 416
3336 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 42