Search results for: sepsis bundle protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1266

Search results for: sepsis bundle protocol

1176 Development of a Nurse Led Tranexamic Acid Administration Protocol for Trauma Patients in Rural South Africa

Authors: Christopher Wearmouth, Jacob Smith

Abstract:

Administration of tranexamic acid (TXA) reduces all-cause mortality in trauma patients when given within 3 hours of injury. Due to geographical distance and lack of emergency medical services patients often present late, following trauma, to our emergency department. Additionally, we found patients that may have benefited from TXA did not receive it, often due to lack of staff awareness, staff shortages out of hours and lack of equipment for delivering infusions. Our objective was to develop a protocol for nurse-led administration of TXA in the emergency department. We developed a protocol using physiological observations along with criteria from the South African Triage Scale to allow nursing staff to identify patients with, or at risk of, significant haemorrhage. We will monitor the use of the protocol to ensure appropriate compliance and for any adverse events reported.

Keywords: emergency department, emergency nursing, rural healthcare, tranexamic acid, trauma, triage

Procedia PDF Downloads 202
1175 Feasibility Study to Enhance the Heat Transfer in a Typical Pressurized Water Reactor by Ribbed Spacer Grids

Authors: A. Ghadbane, M. N. Bouaziz, S. Hanini, B. Baggoura, M. Abbaci

Abstract:

The spacer grids are used to fix the rods bundle in a nuclear reactor core also act as turbulence-enhancing devices to improve the heat transfer from the hot surfaces of the rods to the surrounding coolant stream. Therefore, the investigation of thermal-hydraulic characteristics inside the rod bundles is important for optima design and safety operation of a nuclear reactor power plant. This contribution presents a feasibility study to use the ribbed spacer grids as mixing devices. The present study evaluates the effects of different ribbed spacer grids configurations on flow pattern and heat transfer in the downstream of the mixing devices in a 2 x 2 rod bundle array. This is done by obtaining velocity and pressure fields, turbulent intensity and the heat transfer coefficient using a three-dimensional CFD analysis. Numerical calculations are performed by employing K-ε turbulent model. The computational results obtained are promising and the comparison with standard spacer grids shows a clear difference which required the experimental approach to validate.

Keywords: PWR fuel assembly, spacer grid, mixing vane, swirl flow, turbulent heat transfer, CFD

Procedia PDF Downloads 466
1174 [Keynote Talk]: Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

Authors: Sa’ed Abed, Mohammad H. Al Shayeji, Ovais Ahmed, Sahel Alouneh

Abstract:

Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an “Abstract User Interface” using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.

Keywords: modeling, MSC, SDL, SIP, validating

Procedia PDF Downloads 182
1173 Outcome of Obstetric Admission to General Intensive Care over a Period of 3 Years

Authors: Kamel Abdelaziz Mohamed

Abstract:

Intoduction:Inadequate knowledge about obstetric admission and infrequent dealing with the obstetric patients in ICU results in high mortality and morbidity. Aim of the work:To evaluate the indications, course, severity of illness, and outcome of obstetric patients admitted to the intensive care unit (ICU). Patients and Methods: We collected baseline data and acute physiology and chronic health evaluation II (APACHE II) scores. ICU mortality was the primary outcome. Results: Seventy obstetric patients were admitted to the ICU over 3 years, 36 of these patients (51.4 %) were admitted during the antepartum period. The primary obstetric indication for ICU admission was pregnancy-induced hypertension (22 patients, 31.4%), followed by sepsis (8 patients, 11.4%) as the leading non-obstetric admission. The mean APACHE II score was 19.6. The predicted mortality rate based on the APACHE II score was 22%, however, only 4 maternal deaths (5.7%) were among the obstetric patients admitted to the ICU. Conclusion: Evaluation of obstetric patients by (APACHE II) scores showed higher predicted mortality rate, however the overall mortality was lower. Regular follow up, together with early detection of complications and prompt ICU admission necessitating proper management by specialized team can improve mortality.

Keywords: obstetric, complication, postpartum, sepsis

Procedia PDF Downloads 280
1172 Reactive Analysis of Different Protocol in Mobile Ad Hoc Network

Authors: Manoj Kumar

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper, we compare AODV, DSDV, DSR, and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyze these routing protocols by extensive simulations in OPNET simulator and show how to pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, sent data traffic, throughput, retransmission attempts.

Keywords: AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 487
1171 Modelling of Exothermic Reactions during Carbon Fibre Manufacturing and Coupling to Surrounding Airflow

Authors: Musa Akdere, Gunnar Seide, Thomas Gries

Abstract:

Carbon fibres are fibrous materials with a carbon atom amount of more than 90%. They combine excellent mechanicals properties with a very low density. Thus carbon fibre reinforced plastics (CFRP) are very often used in lightweight design and construction. The precursor material is usually polyacrylonitrile (PAN) based and wet-spun. During the production of carbon fibre, the precursor has to be stabilized thermally to withstand the high temperatures of up to 1500 °C which occur during carbonization. Even though carbon fibre has been used since the late 1970s in aerospace application, there is still no general method available to find the optimal production parameters and the trial-and-error approach is most often the only resolution. To have a much better insight into the process the chemical reactions during stabilization have to be analyzed particularly. Therefore, a model of the chemical reactions (cyclization, dehydration, and oxidation) based on the research of Dunham and Edie has been developed. With the presented model, it is possible to perform a complete simulation of the fibre undergoing all zones of stabilization. The fiber bundle is modeled as several circular fibers with a layer of air in-between. Two thermal mechanisms are considered to be the most important: the exothermic reactions inside the fiber and the convective heat transfer between the fiber and the air. The exothermic reactions inside the fibers are modeled as a heat source. Differential scanning calorimetry measurements have been performed to estimate the amount of heat of the reactions. To shorten the required time of a simulation, the number of fibers is decreased by similitude theory. Experiments were conducted to validate the simulation results of the fibre temperature during stabilization. The experiments for the validation were conducted on a pilot scale stabilization oven. To measure the fibre bundle temperature, a new measuring method is developed. The comparison of the results shows that the developed simulation model gives good approximations for the temperature profile of the fibre bundle during the stabilization process.

Keywords: carbon fibre, coupled simulation, exothermic reactions, fibre-air-interface

Procedia PDF Downloads 243
1170 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 115
1169 Energy Saving in Handling the Air-Conditioning Latent-Load Using a Liquid Desiccant Air Conditioner: Parametric Experimental Analysis

Authors: Mustafa Jaradat

Abstract:

Reasonable energy saving for dehumidification is feasible with the use of desiccants. Desiccants are able to lower the humidity content in the air irrespective of the dew point temperature. In this paper, a tube bundle liquid desiccant air conditioner was experimentally designed and evaluated using lithium chloride as a desiccant. Several experiments were conducted to evaluate the influence of the inlet parameters on the dehumidifier performance. The results show a reduction in the relative humidity in the range of 17 to 46%, and the change in the humidity ratio was between 1.5 to 4.7 g/kg, depending on the inlet conditions. A water removal rate in the range between 0.54 and 1.67 kg/h was observed. The effects of air relative humidity and the desiccant flow rate on the dehumidifier’s performance were investigated. It was found that the moisture removal rate remarkably increased with increasing desiccant flow rate and air inlet humidity ratio. The dehumidifier effectiveness increased sharply with increasing desiccant flow rate. Also, it was found that the dehumidifier effectiveness slightly decreased with air humidity ratio.

Keywords: air conditioning, dehumidification, desiccant, lithium chloride, tube bundle

Procedia PDF Downloads 116
1168 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 388
1167 A Low Power Consumption Routing Protocol Based on a Meta-Heuristics

Authors: Kaddi Mohammed, Benahmed Khelifa D. Benatiallah

Abstract:

A sensor network consists of a large number of sensors deployed in areas to monitor and communicate with each other through a wireless medium. The collected routing data in the network consumes most of the energy of the sensor nodes. For this purpose, multiple routing approaches have been proposed to conserve energy resource at the sensors and to overcome the challenges of its limitation. In this work, we propose a new low energy consumption routing protocol for wireless sensor networks based on a meta-heuristic methods. Our protocol is to operate more fairly energy when routing captured data to the base station.

Keywords: WSN, routing, energy, heuristic

Procedia PDF Downloads 314
1166 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 230
1165 Cytolethal Distending Toxins in Intestinal and Extraintestinal E. coli

Authors: Katarína Čurová, Leonard Siegfried, Radka Vargová, Marta Kmeťová, Vladimír Hrabovský

Abstract:

Introduction: Cytolethal distending toxins (CDTs) represent intracellular acting proteins which interfere with cell cycle of eukaryotic cells. They are produced by Gram-negative bacteria with afinity to mucocutaneous surfaces and could play a role in the pathogenesis of various diseases. CDTs induce DNA damage probably through DNAse activity, which causes cell cycle arrest and leads to further changes (cell distension and death, apoptosis) depending on the cell type. Five subtypes of CDT (I to V) were reported in E. coli. Methods: We examined 252 E. coli strains belonging to four different groups. Of these strains, 57 were isolated from patients with diarrhea, 65 from patients with urinary tract infections (UTI), 65 from patients with sepsis and 65 from patients with other extraintestinal infections (mostly surgical wounds, decubitus ulcers and respiratory tract infections). Identification of these strains was performed by MALDI-TOF analysis and detection of genes encoding CDTs and determination of the phylogenetic group was performed by PCR. Results: In this study, we detected presence of cdt genes in 11 of 252 E. coli strains tested (4,4 %). Four cdt positive E. coli strains were confirmed in group of UTI (6,15 %), three cdt positive E. coli strains in groups of diarrhea (5,3 %) and other extraintestinal infections (4,6 %). The lowest incidence, one cdt positive E. coli strain, was observed in group of sepsis (1,5 %). All cdt positive E. coli strains belonged to phylogenetic group B2. Conclusion: CDT-producing E. coli are isolated in a low percentage from patients with intestinal and extraintestinal infections, including sepsis and our results correspond with these studies. A weak prevalence of cdt genes suggests that CDTs are not major virulence factors but in combination with other virulence factors may increase virulence potential of E. coli. We suppose that all 11 cdt positive E. coli strains represent real pathogens because they belong to the phylogenetic group B2 which is pathogenic lineage for bacteria E. coli.

Keywords: cytolethal distending toxin, E. coli, phylogenetic group, extraintestinal infection, diarrhea

Procedia PDF Downloads 322
1164 On Virtual Coordination Protocol towards 5G Interference Mitigation: Modelling and Performance Analysis

Authors: Bohli Afef

Abstract:

The fifth-generation (5G) wireless systems is featured by extreme densities of cell stations to overcome the higher future demand. Hence, interference management is a crucial challenge in 5G ultra-dense cellular networks. In contrast to the classical inter-cell interference coordination approach, which is no longer fit for the high density of cell-tiers, this paper proposes a novel virtual coordination based on the dynamic common cognitive monitor channel protocol to deal with the inter-cell interference issue. A tractable and flexible model for the coverage probability of a typical user is developed through the use of the stochastic geometry model. The analyses of the performance of the suggested protocol are illustrated both analytically and numerically in terms of coverage probability.

Keywords: ultra dense heterogeneous networks, dynamic common channel protocol, cognitive radio, stochastic geometry, coverage probability

Procedia PDF Downloads 297
1163 Fund Seekers’ Deception in Peer-to-Peer Lending in Times of COVID

Authors: Olivier Mesly

Abstract:

This article examines the likelihood of deception on the part of borrowers wishing to obtain credit from institutional or private lenders. In our first study, we identify five explanatory variables that account for nearly forty percent of the propensity to act deceitfully: a poor credit history, debt, risky behavior, and to a much lesser degree, irrational behavior and disconnection from the bundle of needs, goals, and preferences. For the second study, we remodeled the initial questionnaire to adapt it to the needs of institutional bankers and borrowers, especially those that engage in money on-line peer-to-peer lending, a growing business fueled by the COVID pandemic. We find that the three key psychological variables that help to indirectly predict the likelihood of deceitful behaviors and possible default on loan reimbursement, i.e., risky behaviors, ir-rationality, and dis-connection, interact with each other to form a loop. This study presents two benefits: first, we provide evidence that it is to some degree possible to tighten control over lending practices. Second, we offer a pragmatic tool: a questionnaire, that lenders can use or adapt to gauge potential borrowers’ deceit, notably by combining their results with standard hard-data measures of risk.

Keywords: bundle of needs, default, debt, deception, risk, peer-to-peer lending

Procedia PDF Downloads 100
1162 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 27
1161 A Study of NT-ProBNP and ETCO2 in Patients Presenting with Acute Dyspnoea

Authors: Dipti Chand, Riya Saboo

Abstract:

OBJECTIVES: Early and correct diagnosis may present a significant clinical challenge in diagnosis of patients presenting to Emergency Department with Acute Dyspnoea. The common cause of acute dyspnoea and respiratory distress in Emergency Department are Decompensated Heart Failure (HF), Chronic Obstructive Pulmonary Disease (COPD), Asthma, Pneumonia, Acute Respiratory Distress Syndrome (ARDS), Pulmonary Embolism (PE), and other causes like anaemia. The aim of the study was to measure NT-pro Brain Natriuretic Peptide (BNP) and exhaled End-Tidal Carbon dioxide (ETCO2) in patients presenting with dyspnoea. MATERIAL AND METHODS: This prospective, cross-sectional and observational study was performed at the Government Medical College and Hospital, Nagpur, between October 2019 and October 2021 in patients admitted to the Medicine Intensive Care Unit. Three groups of patients were compared: (1) HFrelated acute dyspnoea group (n = 52), (2) pulmonary (COPD/PE)-related acute dyspnoea group (n = 31) and (3) sepsis with ARDS-related dyspnoea group (n = 13). All patients underwent initial clinical examination with a recording of initial vital parameters along with on-admission ETCO2 measurement, NT-proBNP testing, arterial blood gas analysis, lung ultrasound examination, 2D echocardiography, chest X-rays, and other relevant diagnostic laboratory testing. RESULTS: 96 patients were included in the study. Median NT-proBNP was found to be high for the Heart Failure group (11,480 pg/ml), followed by the sepsis group (780 pg/ml), and pulmonary group had an Nt ProBNP of 231 pg/ml. The mean ETCO2 value was maximum in the pulmonary group (48.610 mmHg) followed by Heart Failure (31.51 mmHg) and the sepsis group (19.46 mmHg). The results were found to be statistically significant (P < 0.05). CONCLUSION: NT-proBNP has high diagnostic accuracy in differentiating acute HF-related dyspnoea from pulmonary (COPD and ARDS)-related acute dyspnoea. The higher levels of ETCO2 help in diagnosing patients with COPD.

Keywords: NT PRO BNP, ETCO2, dyspnoea, lung USG

Procedia PDF Downloads 51
1160 Attenuation of Endotoxin Induced Hepatotoxicity by Dexamethasone, Melatonin and Pentoxifylline in White Albino Mice: A Comparative Study

Authors: Ammara Khan

Abstract:

Sepsis is characterized by an overwhelming surge of cytokines and oxidative stress to one of many factors, gram-negative bacteria commonly implicated. Despite major expansion and elaboration of sepsis pathophysiology and therapeutic approach; death rate remains very high in septic patients due to multiple organ damages including hepatotoxicity.The present study was aimed to ascertain the adequacy of three different drugs delivered separately and collectively- low dose steroid-dexamethasone (3mg/kg i.p) ,antioxidant-melatonin(10 mg/kg i.p) ,and phosphodiesterases inhibitor - pentoxifylline (75 mg/kg i.p)in endotoxin-induced hepatotoxicity in mice. Endotoxin/lipopolysaccharides induced hepatotoxicity was reproduced in mice by giving lipopolysaccharide of serotype E.Coli intraperitoneally. The preventive role was questioned by giving the experimental agent half an hour prior to LPS injection whereas the therapeutic potential of the experimental agent was searched out via post-LPS delivering. The extent of liver damage was adjudged via serum alanine aminotransferases (ALT) and aspartate aminotransferase (AST) estimation along with a histopathological examination of liver tissue. Dexamethasone is given before (Group 3) and after LPS (group 4) significantly attenuated LPS generated liver injury.Pentoxifylline generated similar results and serum ALT; AST histological alteration abated considerably (p≤ 0.05) both in animals subjected to pentoxifylline pre (Group 5) and post-treatment(Group 6). Melatonin was also prosperous in aversion (Group 7) and curation (Group 8) of LPS invoked hepatotoxicity as evident by lessening of augmented ALT (≤0.01) and AST (≤0.01) along with restoration of pathological changes in liver sections (p≤0.05). Combination therapies with dexamethasone in conjunction with melatonin (Group 9), dexamethasone together with pentoxifylline (Group 10), and pentoxifylline along with melatonin (Group 11) after LPS administration tapered LPS evoked hepatic dysfunction statistically considerably. In conclusion, both melatonin and pentoxifylline set up promising results in endotoxin-induced hepatotoxicity and can be used therapeutic adjuncts to conventional treatment strategies in sepsis-induced liver failure.

Keywords: endotoxin/lipopolysacchride, dexamethasone, hepatotoxicity, melatonin, pentoxifylline

Procedia PDF Downloads 249
1159 The Effects of Relationship Banking on the Financial Performance of SMEs in Kenya

Authors: Abraham Rotich

Abstract:

The purpose of this study was to determine the effects of relationship banking on the financial performance of SMEs. The paper attempted to establish the link between the constructs of relationship banking and SME performance. The study was guided by relationship lending, relationship monitoring, relationship risk sharing and bundle of products as independent variables while financial performance will be the dependent variable. The study used a quasi experimental design with population being the 620 SMEs who have a relationship banking arrangement with banks in Nairobi. The study used stratified sampling to pick a sample of 235. The population of interest will be the CEOs of the respective companies. The basis of stratification is the sectors in which the SMEs operate in. The study will use a questionnaire to collect data. The questionnaire will have both open and close ended questions. A pilot study will be conducted to test reliability and validity of questionnaire. The data was analyzed using descriptive statistics. Regression analysis was employed to test if there is a relationship between the dependent and the independent variable. The study found evidence that relationship banking positively impacts on financial performance of SMEs. Specifically, the study established that each component of relationship banking in this study i.e relationship lending, monitoring, bundle of products and risk sharing positively affects financial performance.

Keywords: relationship banking, SMEs, financial performance, entrepreneurial orientation

Procedia PDF Downloads 280
1158 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 50
1157 Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks

Authors: Chothmal

Abstract:

In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet.

Keywords: ad hoc networks, quality of service, video streaming, H.264/SVC, multiple routes, video traces

Procedia PDF Downloads 218
1156 Out of Hospital Cardiac Arrest in Kuala Lumpur: A Mixed Method Study on Incidence, Adherence to Protocol, and Issues

Authors: Mohd Said Nurumal, Sarah Sheikh Abdul Karim

Abstract:

Information regarding out of hospital cardiac arrest incidence include outcome in Malaysia is limited and fragmented. This study aims to identify incidence and adherence to protocol of out of hospital cardiac arrest and also to explore the issues faced by the pre-hospital personnel in regards managing cardiac arrest victim in Kuala Lumpur, Malaysia. A mixed method approach combining the qualitative and quantitative study design was used. The 285 pre-hospital care data sheet of out of hospital cardiac arrest during the year of 2011 were examined by using checklists for identify the incidence and adherence to protocol. Nine semi-structured interviews and two focus group discussions were performed. For the incidence based on the overall out of hospital cardiac arrest cases that occurred in 2011 (n=285), the survival rates were 16.8%. For adherence to protocol, only 89 (41.8%) of the cases adhered to the given protocol and 124 did not adhere to such protocol. The qualitative information provided insight about the issues related to out of hospital cardiac arrest in every aspect. All the relevant qualitative data were merged into few categories relating issues that could affect the management of out of hospital cardiac arrest performed by pre-hospital care team. One of the essential elements in the out of hospital cardiac arrest handling by pre-hospital care is to ensure increase of survival rates and excellent outcomes by adhering to given protocols based on international standard benchmarks. Measures are needed to strengthen the quick activation of the pre-hospital care service, prompt bystander cardiopulmonary resuscitation, early defibrillation and timely advanced cardiac life support and also to tackle all the issues highlighted in qualitative results.

Keywords: pre-hospital care, out of hospital cardiac arrest, incidence, protocol, mixed method research

Procedia PDF Downloads 388
1155 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 217
1154 Investigation of Enhanced Recovery After Surgery Protocol Outcome on Post Colectomy Patients

Authors: Sharon Baoas, Toni Beninato, Michael Zenilman, Gokhan Ozuner

Abstract:

Background An enhanced recovery after surgery (ERAS) protocol was implemented to improve quality and cost effectiveness of surgical care in elective colorectal procedures. Results A total of 109 patients, 55 (pre-ERAS) and 54 (post-ERAS) are included in the final analysis. There were no differences in complications were recorded (p = 0.37) and 30-day readmissions (p = 0.785). The mean hospital stay was 5.89 ± 2.62 days in pre-ERAS and 4.94 ± 2.27 days in post-ERAS group which was statistically significant (p = 0.047). Conclusions An ERAS protocol for colorectal surgery harmonised perioperative care and decreased length of stay.

Keywords: 30-day readmission, lenght of stay, Enhanced Recovery after surgery, Surgical site infection

Procedia PDF Downloads 23
1153 Hierarchical Checkpoint Protocol in Data Grids

Authors: Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed

Abstract:

Grid of computing nodes has emerged as a representative means of connecting distributed computers or resources scattered all over the world for the purpose of computing and distributed storage. Since fault tolerance becomes complex due to the availability of resources in decentralized grid environment, it can be used in connection with replication in data grids. The objective of our work is to present fault tolerance in data grids with data replication-driven model based on clustering. The performance of the protocol is evaluated with Omnet++ simulator. The computational results show the efficiency of our protocol in terms of recovery time and the number of process in rollbacks.

Keywords: data grids, fault tolerance, clustering, chandy-lamport

Procedia PDF Downloads 302
1152 Adaptive Routing Protocol for Dynamic Wireless Sensor Networks

Authors: Fayez Mostafa Alhamoui, Adnan Hadi Mahdi Al- Helali

Abstract:

The main issue in designing a wireless sensor network (WSN) is the finding of a proper routing protocol that complies with the several requirements of high reliability, short latency, scalability, low power consumption, and many others. This paper proposes a novel routing algorithm that complies with these design requirements. The new routing protocol divides the WSN into several sub-networks and each sub-network is divided into several clusters. This division is designed to reduce the number of radio transmission and hence decreases the power consumption. The network division may be changed dynamically to adapt with the network changes and allows the realization of the design requirements.

Keywords: wireless sensor networks, routing protocols, AD HOC topology, cluster, sub-network, WSN design requirements

Procedia PDF Downloads 507
1151 Simple Modified Method for DNA Isolation from Lyophilised Cassava Storage Roots (Manihot esculenta Crantz.)

Authors: P. K. Telengech, K. Monjero, J. Maling’a, A. Nyende, S. Gichuki

Abstract:

There is need to identify an efficient protocol for use in extraction of high quality DNA for purposes of molecular work. Cassava roots are known for their high starch content, polyphenols and other secondary metabolites which interfere with the quality of the DNA. These factors have negative interference on the various methodologies for DNA extraction. There is need to develop a simple, fast and inexpensive protocol that yields high quality DNA. In this improved Dellaporta method, the storage roots are lyophilized to reduce the water content; the extraction buffer is modified to eliminate the high polyphenols, starch and wax. This simple protocol was compared to other protocols intended for plants with similar secondary metabolites. The method gave high yield (300-950ng) and pure DNA for use in PCR analysis. This improved Dellaporta protocol allows isolation of pure DNA from starchy cassava storage roots.

Keywords: cassava storage roots, dellaporta, DNA extraction, lyophilisation, polyphenols secondary metabolites

Procedia PDF Downloads 312
1150 Experimental Evaluation of UDP in Wireless LAN

Authors: Omar Imhemed Alramli

Abstract:

As Transmission Control Protocol (TCP), User Datagram Protocol (UDP) is transfer protocol in the transportation layer in Open Systems Interconnection model (OSI model) or in TCP/IP model of networks. The UDP aspects evaluation were not recognized by using the pcattcp tool on the windows operating system platform like TCP. The study has been carried out to find a tool which supports UDP aspects evolution. After the information collection about different tools, iperf tool was chosen and implemented on Cygwin tool which is installed on both Windows XP platform and also on Windows XP on virtual box machine on one computer only. Iperf is used to make experimental evaluation of UDP and to see what will happen during the sending the packets between the Host and Guest in wired and wireless networks. Many test scenarios have been done and the major UDP aspects such as jitter, packet losses, and throughput are evaluated.

Keywords: TCP, UDP, IPERF, wireless LAN

Procedia PDF Downloads 323
1149 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 267
1148 Spectrum of Acute Kidney Injury in Obstetrics

Authors: Seema Chopra, Amandeep Kaur, Vanita Suri, Shalini Gainder, Minakshi Rohilla

Abstract:

Background: Acute kidney injury (AKI) associated with pregnancy is a serious medical complication which can lead to significant maternal as well as perinatal morbidity and mortality. Material and methods: This prospective observational study was carried out in the Obstetrics and Gynaecology department and dialysis unit of Nephrology department of PGIMER, Chandigarh from July 2013 to June 2014. Forty antenatal/postnatal/postabortal patients who fulfilled the AKIN criteria were enrolled in the study. All patients were followed up till 3 months postpartum. Results: Majority of the patients 23/40 (57.5%) with AKI presented in postpartum period, 14/40 (35%) developed AKI in antenatal period, and 3/40 (7.5%) were postabortal. AKI was attributable mostly to sepsis in 11/40 (27.5%) and PPH in 5/40 (12.5%). Hypertension and its complications causing AKI included eclampsia in 5/40 (12.5%) followed by 3/40 (7.5%) as HELLP syndrome and abruption placentae in 2/40(5%) patients. Three patients each (7.5%) had AFLP, TMA, and HEV as the cause of AKI. Renal replacement therapy in the form of hemodialysis was the treatment in majority of them (28 (70%)). After the acute event, 25 (62.5%) had complete recovery of their renal functions at 3 months follow up. Maternal mortality was seen in 25% (n=10) of the study patients. Conclusion: Timely initiation of RRT in patients with AKI associated with pregnancy has a good maternal outcome in the form of complete recovery of renal functions in 62.5% (25/40) of patients.

Keywords: AKI, dialysis, hypertension, sepsis, renal parameters

Procedia PDF Downloads 137
1147 Data Rate Based Grouping Scheme for Cooperative Communications in Wireless LANs

Authors: Sunmyeng Kim

Abstract:

IEEE 802.11a/b/g standards provide multiple transmission rates, which can be changed dynamically according to the channel condition.Cooperative communications we reintroduced to improve the overallperformance of wireless LANs with the help of relay nodes with higher transmission rates. The cooperative communications are based on the fact that the transmission is much faster when sending data packets to a destination node through a relay node with higher transmission rate, rather than sending data directly to the destination node at low transmission rate. To apply the cooperative communications in wireless LAN, several MAC protocols have been proposed. Some of them can result in collisions among relay nodes in a dense network. In order to solve this problem, we propose a new protocol. Relay nodes are grouped based on their transmission rates. And then, relay nodes only in the highest group try to get channel access. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and collision probability.

Keywords: cooperative communications, MAC protocol, relay node, WLAN

Procedia PDF Downloads 443