Search results for: throwing protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 645

Search results for: throwing protocols

285 Knowledge of the Doctors Regarding International Patient Safety Goal

Authors: Fatima Saeed, Abdullah Mudassar

Abstract:

Introduction: Patient safety remains a global priority in the ever-evolving healthcare landscape. At the forefront of this endeavor are the International Patient Safety Goals (IPSGs), a standardized framework designed to mitigate risks and elevate the quality of care. Doctors, positioned as primary caregivers, wield a pivotal role in upholding and adhering to IPSGs, underscoring the critical significance of their knowledge and understanding of these goals. This research embarks on a comprehensive exploration into the depth of Doctors ' comprehension of IPSGs, aiming to unearth potential gaps and provide insights for targeted educational interventions. Established by influential healthcare bodies, including the World Health Organization (WHO), IPSGs represent a universally applicable set of objectives spanning crucial domains such as medication safety, infection control, surgical site safety, and patient identification. Adherence to these goals has exhibited substantial reductions in adverse events, fostering an overall enhancement in the quality of care. This study operates on the fundamental premise that an informed Doctors workforce is indispensable for effectively implementing IPSGs. A nuanced understanding of these goals empowers Doctors to identify potential risks, advocate for necessary changes, and actively contribute to a safety-centric culture within healthcare institutions. Despite the acknowledged importance of IPSGs, there is a growing concern that nurses may need more knowledge to integrate these goals into their practice seamlessly. Methodology: A Comprehensive research methodology covering study design, setting, duration, sample size determination, sampling technique, and data analysis. It introduces the philosophical framework guiding the research and details material, methods, and the analysis framework. The descriptive quantitative cross-sectional study in teaching care hospitals utilized convenient sampling over six months. Data collection involved written informed consent and questionnaires, analyzed with SPSS version 23, presenting results graphically and descriptively. The chapter ensures a clear understanding of the study's design, execution, and analytical processes. Result: The survey results reveal a substantial distribution across hospitals, with 34.52% in MTIKTH and 65.48% in HMC MTI. There is a notable prevalence of patient safety incidents, emphasizing the significance of adherence to IPSGs. Positive trends are observed, including 77.0% affirming the "time-out" procedure, 81.6% acknowledging effective healthcare provider communication, and high recognition (82.7%) of the purpose of IPSGs to improve patient safety. While the survey reflects a good understanding of IPSGs, areas for improvement are identified, suggesting opportunities for targeted interventions. Discussion: The study underscores the need for tailored care approaches and highlights the bio-socio-cultural context of 'contagion,' suggesting areas for further research amid antimicrobial resistance. Shifting the focus to patient safety practices, the survey chapter provides a detailed overview of results, emphasizing workplace distribution, patient safety incidents, and positive reflections on IPSGs. The findings indicate a positive trend in patient safety practices with areas for improvement, emphasizing the ongoing need for reinforcing safety protocols and cultivating a safety-centric culture in healthcare. Conclusion: In summary, the survey indicates a positive trend in patient safety practices with a good understanding of IPSGs among participants. However, identifying areas for potential improvement suggests opportunities for targeted interventions to enhance patient safety further. Ongoing efforts to reinforce adherence to safety protocols, address identified gaps, and foster a safety culture will contribute to continuous improvements in patient care and outcomes.

Keywords: infection control, international patient safety, patient safety practices, proper medication

Procedia PDF Downloads 26
284 Dental Ethics versus Malpractice, as Phenomenon with a Growing Trend

Authors: Saimir Heta, Kers Kapaj, Rialda Xhizdari, Ilma Robo

Abstract:

Dealing with emerging cases of dental malpractice with justifications that stem from the clear rules of dental ethics is a phenomenon with an increasing trend in today's dental practice. Dentists should clearly understand how far the limit of malpractice goes, with or without minimal or major consequences, for the affected patient, which can be justified as a complication of dental treatment, in support of the rules of dental ethics in the dental office. Indeed, malpractice can occur in cases of lack of professionalism, but it can also come as a consequence of anatomical and physiological limitations in the implementation of the dental protocols, predetermined and indicated by the patient in the paragraph of the treatment plan in his personal card. This study is of the review type with the aim of the latest findings published in the literature about the problem of dealing with these phenomena. The combination of keywords is done in such a way with the aim to give the necessary space for collecting the right information in the networks of publications about this field, always first from the point of view of the dentist and not from that of the lawyer or jurist. From the findings included in this article, it was noticed the diversity of approaches towards the phenomenon depends on the different countries based on the legal basis that these countries have. There is a lack of or a small number of articles that touch on this topic, and these articles are presented with a limited number of data on the same topic. Conclusions: Dental malpractice should not be hidden under the guise of various dental complications that we justify with the strict rules of ethics for patients treated in the dental chair. The individual experience of dental malpractice must be published with the aim of serving as a source of experience for future generations of dentists.

Keywords: dental ethics, malpractice, professional protocol, random deviation

Procedia PDF Downloads 67
283 New Employee on-Boarding Program: Effective Tool for Reducing the Prevalence of Workplace Injuries/Accidents

Authors: U. Ugochukwu, J. Lee, P. Conley

Abstract:

According to a recent survey by the UT Southwestern Workplace Safety Committee, the three most common on-the-job injuries reported by workers at the medical center are musculoskeletal injuries, slip-and-fall injuries and repetitive motion injuries. Last year alone, of the 650 documented workplace injuries and accidents, 45% were seen in employees in their first-two years of employment. UT Southwestern New Employee On-Boarding program was created and modeled to follows OSHA’s model that consist of: determining if training is needed, identifying training needs, identifying goals and objectives, developing learning activities, conducting the training, evaluating program effectiveness, and improving the program. The hospital’s management best practices were recreated to limit and control workplace injuries and accidents. Regular trainings and workshops on workplace safety and compliance were initiated for new employees. Various computer workstations were evaluated and recommendations were made to reduce musculoskeletal disorders. Post exposure protocols and workers protection programs were remodeled for infectious agents and chemicals used in the hospital, and medical surveillance programs were updated, for every emerging threat, to ensure they are in compliance with the US policy, regulatory and standard setting organizations. If ignorance of specific job hazards and of proper work practices is to blame for this higher injury rate, then training will help to provide a solution. Use of this program in training activities is just one of many ways UT Southwestern complied with the OSHA standards that relate to training while enhancing the safety and health of their employees.

Keywords: ergonomics, hazard, on-boarding, surveillance, workplace

Procedia PDF Downloads 303
282 Identification of Knee Dynamic Profiles in High Performance Athletes with the Use of Motion Tracking

Authors: G. Espriú-Pérez, F. A. Vargas-Oviedo, I. Zenteno-Aguirrezábal, M. D. Moya-Bencomo

Abstract:

One of the injuries with a higher incidence among university-level athletes in the North of Mexico is presented in the knee. This injury generates absenteeism in training and competitions for at least 8 weeks. There is no active quantitative methodology, or protocol, that directly contributes to the clinical evaluation performed by the medical personnel at the prevalence of knee injuries. The main objective is to contribute with a quantitative tool that allows further development of preventive and corrective measures to these injuries. The study analyzed 55 athletes for 6 weeks, belonging to the disciplines of basketball, volleyball, soccer and swimming. Using a motion capture system (Nexus®, Vicon®), a three-dimensional analysis was developed that allows the measurement of the range of movement of the joint. To focus on the performance of the lower limb, eleven different movements were chosen from the Functional Performance Test, Functional Movement Screen, and the Cincinnati Jump Test. The research identifies the profile of the natural movement of a healthy knee, with the use of medical guidance, and its differences between each sport. The data recovered by the single-leg crossover hop managed to differentiate the type of knee movement among athletes. A maximum difference of 60° of offset was found in the adduction movement between male and female athletes of the same discipline. The research also seeks to serve as a guideline for the implementation of protocols that help identify the recovery level of such injuries.

Keywords: Cincinnati jump test, functional movement screen, functional performance test, knee, motion capture system

Procedia PDF Downloads 104
281 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 411
280 Design of SAE J2716 Single Edge Nibble Transmission Digital Sensor Interface for Automotive Applications

Authors: Jongbae Lee, Seongsoo Lee

Abstract:

Modern sensors often embed small-size digital controller for sensor control, value calibration, and signal processing. These sensors require digital data communication with host microprocessors, but conventional digital communication protocols are too heavy for price reduction. SAE J2716 SENT (single edge nibble transmission) protocol transmits direct digital waveforms instead of complicated analog modulated signals. In this paper, a SENT interface is designed in Verilog HDL (hardware description language) and implemented in FPGA (field-programmable gate array) evaluation board. The designed SENT interface consists of frame encoder/decoder, configuration register, tick period generator, CRC (cyclic redundancy code) generator/checker, and TX/RX (transmission/reception) buffer. Frame encoder/decoder is implemented as a finite state machine, and it controls whole SENT interface. Configuration register contains various parameters such as operation mode, tick length, CRC option, pause pulse option, and number of nibble data. Tick period generator generates tick signals from input clock. CRC generator/checker generates or checks CRC in the SENT data frame. TX/RX buffer stores transmission/received data. The designed SENT interface can send or receives digital data in 25~65 kbps at 3 us tick. Synthesized in 0.18 um fabrication technologies, it is implemented about 2,500 gates.

Keywords: digital sensor interface, SAE J2716, SENT, verilog HDL

Procedia PDF Downloads 267
279 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 16
278 Digital Forensic Exploration Framework for Email and Instant Messaging Applications

Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed

Abstract:

Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.

Keywords: forensics, network sessions, packet reconstruction, packet reordering

Procedia PDF Downloads 308
277 Insights Into Serotonin-Receptor Binding and Stability via Molecular Dynamics Simulations: Key Residues for Electrostatic Interactions and Signal Transduction

Authors: Arunima Verma, Padmabati Mondal

Abstract:

Serotonin-receptor binding plays a key role in several neurological and biological processes, including mood, sleep, hunger, cognition, learning, and memory. In this article, we performed molecular dynamics simulation to examine the key residues that play an essential role in the binding of serotonin to the G-protein-coupled 5-HT₁ᴮ receptor (5-HT₁ᴮ R) via electrostatic interactions. An end-point free energy calculation method (MM-PBSA) determines the stability of the 5-HT1B R due to serotonin binding. The single-point mutation of the polar or charged amino acid residues (Asp129, Thr134) on the binding sites and the calculation of binding free energy validate the importance of these residues in the stability of the serotonin-receptor complex. Principal component analysis indicates the serotonin-bound 5-HT1BR is more stabilized than the apo-receptor in terms of dynamical changes. The difference dynamic cross-correlations map shows the correlation between the transmembrane and mini-Go, which indicates signal transduction happening between mini-Go and the receptor. Allosteric communication reveals the key nodes for signal transduction in 5-HT1BR. These results provide useful insights into the signal transduction pathways and mutagenesis study to regulate the functionality of the complex. The developed protocols can be applied to study local non-covalent interactions and long-range allosteric communications in any protein-ligand system for computer-aided drug design.

Keywords: allostery, CADD, MD simulations, MM-PBSA

Procedia PDF Downloads 49
276 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 83
275 Influence of Atmospheric Pollutants on Child Respiratory Disease in Cartagena De Indias, Colombia

Authors: Jose A. Alvarez Aldegunde, Adrian Fernandez Sanchez, Matthew D. Menden, Bernardo Vila Rodriguez

Abstract:

Up to five statistical pre-processings have been carried out considering the pollutant records of the stations present in Cartagena de Indias, Colombia, also taking into account the childhood asthma incidence surveys conducted in hospitals in the city by the Health Ministry of Colombia for this study. These pre-processings have consisted of different techniques such as the determination of the quality of data collection, determination of the quality of the registration network, identification and debugging of errors in data collection, completion of missing data and purified data, as well as the improvement of the time scale of records. The characterization of the quality of the data has been conducted by means of density analysis of the pollutant registration stations using ArcGis Software and through mass balance techniques, making it possible to determine inconsistencies in the records relating the registration data between stations following the linear regression. The results obtained in this process have highlighted the positive quality in the pollutant registration process. Consequently, debugging of errors has allowed us to identify certain data as statistically non-significant in the incidence and series of contamination. This data, together with certain missing records in the series recorded by the measuring stations, have been completed by statistical imputation equations. Following the application of these prior processes, the basic series of incidence data for respiratory disease and pollutant records have allowed the characterization of the influence of pollutants on respiratory diseases such as, for example, childhood asthma. This characterization has been carried out using statistical correlation methods, including visual correlation, simple linear regression correlation and spectral analysis with PAST Software which identifies maximum periodicity cycles and minimums under the formula of the Lomb periodgram. In relation to part of the results obtained, up to eleven maximums and minimums considered contemporary between the incidence records and the particles have been identified taking into account the visual comparison. The spectral analyses that have been performed on the incidence and the PM2.5 have returned a series of similar maximum periods in both registers, which are at a maximum during a period of one year and another every 25 days (0.9 and 0.07 years). The bivariate analysis has managed to characterize the variable "Daily Vehicular Flow" in the ninth position of importance of a total of 55 variables. However, the statistical correlation has not obtained a favorable result, having obtained a low value of the R2 coefficient. The series of analyses conducted has demonstrated the importance of the influence of pollutants such as PM2.5 in the development of childhood asthma in Cartagena. The quantification of the influence of the variables has been able to determine that there is a 56% probability of dependence between PM2.5 and childhood respiratory asthma in Cartagena. Considering this justification, the study could be completed through the application of the BenMap Software, throwing a series of spatial results of interpolated values of the pollutant contamination records that exceeded the established legal limits (represented by homogeneous units up to the neighborhood level) and results of the impact on the exacerbation of pediatric asthma. As a final result, an economic estimate (in Colombian Pesos) of the monthly and individual savings derived from the percentage reduction of the influence of pollutants in relation to visits to the Hospital Emergency Room due to asthma exacerbation in pediatric patients has been granted.

Keywords: Asthma Incidence, BenMap, PM2.5, Statistical Analysis

Procedia PDF Downloads 88
274 Ovarian Hormones and Antioxidants Biomarkers in Dromedary Camels Synchronized with Controlled Intravaginal Drug Release/Ovsynch GPG Program during Breeding Season

Authors: Heba Hozyen, Ragab Mohamed, Amal Abd El Hameed, Amal Abo El-Maaty

Abstract:

This study aimed to investigate the effect of CIDR and ovsynch (Gonadotropin-prostaglandine-gonadotropin GPG) protocols for synchronization of follicular waves of dromedary camels on ovarian hormones, oxidative stress and conception during breeding season. Twelve dark colored dromedary camels were divided into two equal groups. The first group was subjected to CIDR insertion for 7 days and blood samples were collected each other day from the day of CIDR insertion (day 0) till day 21. The other group was subjected to GPG system (Ovsynch) and blood samples were collected daily for 11 days. Progesterone (P4) and estradiol were assayed using commercial ELISA diagnostic EIA kits. Catalase (CAT), total antioxidants capacity (TAC), glutathione reduced (GHD), lipid peroxide product (malondialdehyde, MDA) and nitric oxide (NO) were measured colorimetrically using spectrophotometer. Results revealed that CIDR treated camels had significantly high P4 (P= 0.0001), estradiol (P= 0.0001), CAT (P= 0.034), NO (P= 0.016) and TAC (P= 0.04) but significantly low MDA (P= 0.001) and GHD (P= 0.003) compared to GPG treated ones. Camels inserted with CIDR had higher conception rate (66.7%) compared to those treated with GPG (33%). In conclusion, camels treated with CIDR had higher hormonal response and antioxidant capacity than those synchronized with GPG which positively reflected on their conception rate. The better response of camels to CIDR and the higher conception compared to GPG protocol recommends its use for future reproductive management in camels.

Keywords: antioxidants, camel, CIDR, season, steroid hormones

Procedia PDF Downloads 264
273 Sustainable and Efficient Recovery of Polyhydroxyalkanoate Polymer from Cupriavidus necator Using Environment Friendly Solvents

Authors: Geeta Gahlawat, Sanjeev Kumar Soni

Abstract:

An imprudent use of environmentally hazardous petrochemical-based plastics and limited availability of fossil fuels have provoked research interests towards production of biodegradable plastics - polyhydroxyalkanoate (PHAs). However, the industrial application of PHAs based products is primarily restricted by their high cost of recovery and extraction protocols. Moreover, solvents used for the extraction and purification are toxic and volatile which causes adverse environmental hazards. Development of efficient downstream recovery strategies along with utilization of non-toxic solvents will accelerate their commercialization. In this study, various extraction strategies were designed for sustainable and cost-effective recovery of PHAs from Cupriavidus necator using non-toxic environment friendly solvents viz. 1,2-propylene carbonate, ethyl acetate, isoamyl alcohol, butyl acetate. The effect of incubation time i.e. 10, 30 and 50 min and temperature i.e. 60, 80, 100, 120°C was tested to identify the most suitable solvent. PHAs extraction using a recyclable solvent, 1,2 propylene carbonate, showed the highest recovery yield (90%) and purity (93%) at 120°C and 30 min incubation. Ethyl acetate showed the better capacity to recover PHAs from cells than butyl acetate. Extraction with ethyl acetate exhibited high recovery yield and purity of 96% and 92%, respectively at 100°C. Effect of non-toxic surfactant such as linear alkylbenzene sulfonic acid (LAS) was also studied at 40, 60 and 80°C, and detergent pH range of 3.0, 5.0, 7.0 and 9.0 for the extraction of PHAs from the cells. LAS gave highest yield of 86% and purity of 88% at temperature 80°C and 5.0 pH.

Keywords: polyhydroxyalkanoates, Cupriavidus necator, extraction, recovery yield

Procedia PDF Downloads 481
272 The Role of the Linguistic Mediator in Relation to Culturally Oriented Crimes

Authors: Andreas Aceranti, Simonetta Vernocchi, Elisabetta Aldrovandi, Marco Colorato, Carolina Ascrizzi

Abstract:

Nowadays, especially due to an increasing flow of migration and uncontrolled globalisation, linguistic, cultural and religious differences can be a major obstacle for people belonging to different ethnic groups. Each group has its own traditional background, which, in addition to its positive aspects, also includes extremely unpleasant and dramatic situations: culture-related crimes. We analysed several cases belonging to this category of crime which is becoming more and more present in Europe, creating not only a strong social rift dictated by the misunderstanding between migrants and host populations but also by the isolation and ghettoisation of subjects classified as 'different'. Such social rejection, in fact, represents a great source of stress and frustration for those who seek to be part of the community and can generate phenomena of rebellion that result in violent acts. Similar situations must be addressed by the figure of the cultural-linguistic mediator who, thanks to his or her multidisciplinary knowledge, assumes the role of a 'bridge', thus helping the process of awareness and understanding within the social group through the use of various tools, including awareness-raising campaigns and interventions in both the school and social-health sectors. By analysing how the notions of culture and offense have evolved throughout history until they have merged into a single principle and, secondly, how the figure of the language mediator represents a fundamental role in the resolution of conflicts related to cultural diversity has helped us define the basis for new protocols in dealing with such crimes. Especially we have to define the directions of further investigations that we will carry out in the next months.

Keywords: cultural crimes, hatred crimes, immigration, cultural mediation

Procedia PDF Downloads 61
271 Percentage Change in the Selected Skinfold Measurements of Male Students of University of Delhi Due to Progressive and Constant Load of Physical Training

Authors: Seema Kaushik

Abstract:

Skinfold measurements provide considerably meaningful and consistent information about subcutaneous fat and its distribution. Physical activities in the form of conditioning and/or training leads to various structural, functional and mechanical changes and numerous training programmes exist for the improvement of physical fitness, however, most of the studies are conducted on foreign soil with foreign population as sample, which may/may not be applicable to the Indian conditions. Moreover, there is not even a single training/ conditioning programme that caters to the need of male students of University of Delhi with regard to various skinfold thickness measurements. Hence, the present study aimed at studying the effect of progressive and constant load training on selected skinfold measurements of male students of University of Delhi in form of percentage change. The sample size for the study was 90 having three groups of male; 30 samples in each group (mean age = 20.04±0.49 years). The variables included triceps, sub-scapular, supra-iliac and calf skinfolds. The experimental design adopted for the study was multi-group repeated measure design. Three different groups were measured four times repeatedly at an interval of 6 weeks, on completion of each of the three meso-cycles. Standard landmarks and protocols were followed to measure the selected variables. Mean, standard deviation and percentage were computed to analyze the data statistically. The study concluded that both the progressive and constant load of physical training bring changes in the skinfold thickness measurements of male students of University of Delhi.

Keywords: constant load, progressive load, physical training, skinfold measurements

Procedia PDF Downloads 304
270 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 45
269 Evolutionary Swarm Robotics: Dynamic Subgoal-Based Path Formation and Task Allocation for Exploration and Navigation in Unknown Environments

Authors: Lavanya Ratnabala, Robinroy Peter, E. Y. A. Charles

Abstract:

This research paper addresses the challenges of exploration and navigation in unknown environments from an evolutionary swarm robotics perspective. Path formation plays a crucial role in enabling cooperative swarm robots to accomplish these tasks. The paper presents a method called the sub-goal-based path formation, which establishes a path between two different locations by exploiting visually connected sub-goals. Simulation experiments conducted in the Argos simulator demonstrate the successful formation of paths in the majority of trials. Furthermore, the paper tackles the problem of inter-collision (traffic) among a large number of robots engaged in path formation, which negatively impacts the performance of the sub-goal-based method. To mitigate this issue, a task allocation strategy is proposed, leveraging local communication protocols and light signal-based communication. The strategy evaluates the distance between points and determines the required number of robots for the path formation task, reducing unwanted exploration and traffic congestion. The performance of the sub-goal-based path formation and task allocation strategy is evaluated by comparing path length, time, and resource reduction against the A* algorithm. The simulation experiments demonstrate promising results, showcasing the scalability, robustness, and fault tolerance characteristics of the proposed approach.

Keywords: swarm, path formation, task allocation, Argos, exploration, navigation, sub-goal

Procedia PDF Downloads 21
268 Information Pollution: Exploratory Analysis of Subs-Saharan African Media’s Capabilities to Combat Misinformation and Disinformation

Authors: Muhammed Jamiu Mustapha, Jamiu Folarin, Stephen Obiri Agyei, Rasheed Ademola Adebiyi, Mutiu Iyanda Lasisi

Abstract:

The role of information in societal development and growth cannot be over-emphasized. It has remained an age-long strategy to adopt the information flow to make an egalitarian society. The same has become a tool for throwing society into chaos and anarchy. It has been adopted as a weapon of war and a veritable instrument of psychological warfare with a variety of uses. That is why some scholars posit that information could be deployed as a weapon to wreak “Mass Destruction" or promote “Mass Development". When used as a tool for destruction, the effect on society is like an atomic bomb which when it is released, pollutes the air and suffocates the people. Technological advancement has further exposed the latent power of information and many societies seem to be overwhelmed by its negative effect. While information remains one of the bedrock of democracy, the information ecosystem across the world is currently facing a more difficult battle than ever before due to information pluralism and technological advancement. The more the agents involved try to combat its menace, the difficult and complex it is proving to be curbed. In a region like Africa with dangling democracy enfolds with complexities of multi-religion, multi-cultures, inter-tribes, ongoing issues that are yet to be resolved, it is important to pay critical attention to the case of information disorder and find appropriate ways to curb or mitigate its effects. The media, being the middleman in the distribution of information, needs to build capacities and capabilities to separate the whiff of misinformation and disinformation from the grains of truthful data. From quasi-statistical senses, it has been observed that the efforts aimed at fighting information pollution have not considered the built resilience of media organisations against this disorder. Apparently, the efforts, resources and technologies adopted for the conception, production and spread of information pollution are much more sophisticated than approaches to suppress and even reduce its effects on society. Thus, this study seeks to interrogate the phenomenon of information pollution and the capabilities of select media organisations in Sub-Saharan Africa. In doing this, the following questions are probed; what are the media actions to curb the menace of information pollution? Which of these actions are working and how effective are they? And which of the actions are not working and why they are not working? Adopting quantitative and qualitative approaches and anchored on the Dynamic Capability Theory, the study aims at digging up insights to further understand the complexities of information pollution, media capabilities and strategic resources for managing misinformation and disinformation in the region. The quantitative approach involves surveys and the use of questionnaires to get data from journalists on their understanding of misinformation/disinformation and their capabilities to gate-keep. Case Analysis of select media and content analysis of their strategic resources to manage misinformation and disinformation is adopted in the study while the qualitative approach will involve an In-depth Interview to have a more robust analysis is also considered. The study is critical in the fight against information pollution for a number of reasons. One, it is a novel attempt to document the level of media capabilities to fight the phenomenon of information disorder. Two, the study will enable the region to have a clear understanding of the capabilities of existing media organizations to combat misinformation and disinformation in the countries that make up the region. Recommendations emanating from the study could be used to initiate, intensify or review existing approaches to combat the menace of information pollution in the region.

Keywords: disinformation, information pollution, misinformation, media capabilities, sub-Saharan Africa

Procedia PDF Downloads 141
267 Trauma System in England: An Overview and Future Directions

Authors: Raheel Shakoor Siddiqui, Sanjay Narayana Murthy, Manikandar Srinivas Cheruvu, Kash Akhtar

Abstract:

Major trauma is a dynamic public health epidemic that is continuously evolving. Major trauma care services rely on multi-disciplinary team input involving highly trained pre and in-hospital critical care teams. Pre-hospital critical care teams (PHCCTs), major trauma centres (MTCs), trauma units, and rehabilitation facilities all form an efficient and organised trauma system. England comprises 27 MTCs funded by the National Health Service (NHS). Major trauma care entails enhanced resuscitation protocols coupled with the expertise of dedicated trauma teams and rapid radiological imaging to improve trauma outcomes. Literature reports a change in the demographic of major trauma as elderly patients (silver trauma) with injuries sustained from a fall of 2 metres or less commonly present to services. Evidence of an increasing population age with multiple comorbidities necessitates treatment within the first hour of injury (golden hour) to improve trauma survival outcomes. Staffing and funding pressures within the NHS have subsequently led to a shortfall of available physician-led PHCCTs. Thus, there is a strong emphasis on targeted research and funding to appropriately deploy resources to deprived areas. This review article will discuss the current English trauma system whilst critically appraising present challenges, identifying insufficiencies, and recommending aims for an improved future trauma system in England.

Keywords: trauma, orthopaedics, major trauma, trauma system, trauma network

Procedia PDF Downloads 153
266 Testing the Possibility of Healthy Individuals to Mimic Fatigability in Multiple Sclerotic Patients

Authors: Emmanuel Abban Sagoe

Abstract:

A proper functioning of the Central Nervous System ensures that we are able to accomplish just about everything we do as human beings such as walking, breathing, running, etc. Myelinated neurons throughout the body which transmit signals at high speeds facilitate these actions. In the case of MS, the body’s immune system attacks the myelin sheath surrounding the neurons and overtime destroys the myelin sheaths. Depending upon where the destruction occurs in the brain symptoms can vary from person to person. Fatigue is, however, the biggest problem encountered by an MS sufferer. It is very often described as the bedrock upon which other symptoms of MS such challenges in balance and coordination, dizziness, slurred speech, etc. may occur. Classifying and distinguishing between perceptions based fatigue and performance based fatigability is key to identifying appropriate treatment options for patients. Objective methods for assessing motor fatigability is also key to providing clinicians and physiotherapist with critical information on the progression of the symptom. This study tested if the Fatigue Index Kliniken Schmieder assessment tool can detect fatigability as seen in MS patients when healthy subjects with no known history of neurological pathology mimic abnormal gaits. Thirty three healthy adults between ages 18-58years volunteered as subjects for the study. The subjects, strapped with RehaWatch sensors on both feet, completed 6 gait protocols of normal and mimicked fatigable gaits for 60 seconds per each gait and at 1.38889m/s treadmill speed following clear instructions given.

Keywords: attractor attributes, fatigue index Kliniken Schmieder, gait variability, movement pattern

Procedia PDF Downloads 99
265 Estimation of Effective Radiation Dose Following Computed Tomography Urography at Aminu Kano Teaching Hospital, Kano Nigeria

Authors: Idris Garba, Aisha Rabiu Abdullahi, Mansur Yahuza, Akintade Dare

Abstract:

Background: CT urography (CTU) is efficient radiological examination for the evaluation of the urinary system disorders. However, patients are exposed to a significant radiation dose which is in a way associated with increased cancer risks. Objectives: To determine Computed Tomography Dose Index following CTU, and to evaluate organs equivalent doses. Materials and Methods: A prospective cohort study was carried at a tertiary institution located in Kano northwestern. Ethical clearance was sought and obtained from the research ethics board of the institution. Demographic, scan parameters and CT radiation dose data were obtained from patients that had CTU procedure. Effective dose, organ equivalent doses, and cancer risks were estimated using SPSS statistical software version 16 and CT dose calculator software. Result: A total of 56 patients were included in the study, consisting of 29 males and 27 females. The common indication for CTU examination was found to be renal cyst seen commonly among young adults (15-44yrs). CT radiation dose values in DLP, CTDI and effective dose for CTU were 2320 mGy cm, CTDIw 9.67 mGy and 35.04 mSv respectively. The probability of cancer risks was estimated to be 600 per a million CTU examinations. Conclusion: In this study, the radiation dose for CTU is considered significantly high, with increase in cancer risks probability. Wide radiation dose variations between patient doses suggest that optimization is not fulfilled yet. Patient radiation dose estimate should be taken into consideration when imaging protocols are established for CT urography.

Keywords: CT urography, cancer risks, effective dose, radiation exposure

Procedia PDF Downloads 308
264 Nanda Ways of Knowing, Being and Doing: Our Process of Research Engagement and Research Impacts

Authors: Steven Kelly

Abstract:

A fundament role of the researcher is research engagement, that is, the interaction between researchers and research end-users outside of academia for the mutually beneficial transfer of knowledge, technologies, methods, or resources. While research impact is the contribution that research makes to the economy, society, environment, or culture beyond the contribution to academic research. Ironically, traditional impact metrics in the academy are designed to focus on the outputs; it dismisses the important role engagement plays in fostering a collaborative process that leads to meaningful, ethical, and useful impacts. Dr. Kelly, aNanda (First Nations) man himself, has worked closely with the Nanda community over the past decade, ensuring cultural protocols are upheld and implemented while doing research engagement. The focus was on the process, which was essential to foster a positive research impact culture. The contributions that flowed from this process were the naming of a new species of squat lobster in the Nanda language, a poster design in collaboration with The University of Melbourne, Museums Victoria and Bundiyarra - IrraWanga language centre, media coverage, and the formation of the “Nanda language, Nanda country project”. The Nanda language, Nanda country project is a language revitalization project that focused on reconnecting Nanda people with the language & culture on Nanda Country. Such outcomes are imperative on the eve of the United Nations International Decade of Indigenous Languages. In this paperDr, Kellywill discuss howNanda cultural practicesinformed research engagement to foster a collaborative processthat, in turn, ledto meaningful, ethical, and useful impacts within and outside of the academy.

Keywords: community collaboration, indigenous, nanda, research engagement, research impacts

Procedia PDF Downloads 80
263 The Impact of Covid-19 Pandemic on Acute Urology Admissions in a Busy District General Hospital in the UK

Authors: D. Bheenick, M. Young, M.Elmussareh, A.Ali

Abstract:

Objective: Coronavirus disease 2019 (COVID-19) has had unprecedented effects on the healthcare system in the UK. The pandemic has impacted every service within secondary care, including urology. Our objective is to determine how COVID-19 has influenced acute urology admissions in a busy district general hospital in the UK. Patient and methods: Retrospective data of patients presenting acutely to the urology department was collected between 13th January to 22nd March 2020 (pre-lockdown period) and 23rd March to 31st May 2020 (lockdown period). The nature of referrals, types of admission encountered, and management required in accordance with the new set of protocols established during the lockdown period were analysed and compared to the same data prior to UK lockdown. Results: 1092 patients were included in the study. An overall reduction of 32.5% was seen in the total number of admissions. A marked decrease was seen in non-urological pathology as compared to other categories. Urolithiasis showed the highest proportional increase. Treatment varied proportionately to the diagnosis, with conservative management accounting for the most likely treatment during lockdown. However, the proportion of patients requiring interventions during the lockdown period increased overall. No comparative differences were observed during the two periods in terms of source of referral, length of stay and patient age. Conclusion: The admission rate showed a decrease, with no significant difference in the nature and timing of presentation. Our department was able to continue providing effective management to patients presenting acutely during the COVID-19 outbreak.

Keywords: COVID-19, lockdown, admissions, urology

Procedia PDF Downloads 146
262 Health and Safety of Red Cross Workers in Long-Term Homes during Early Days of the COVID-19 Pandemic: A Human Performance Perspective

Authors: Douglas J. Kube

Abstract:

At the beginning of the COVID-19 pandemic, the Canadian Red Cross deployed workers into long-term care homes across Canada to support our most vulnerable citizens. It began by recruiting and training small teams of workers to provide non-clinical services for facilities in outbreak. Deployed workers were trained on an approach based on successful Red Cross deployments used with Ebola in which zones were established, levels of protection used, and strict protocols followed to prevent exposure. This paper addresses aspects of human performance through a safety culture lens. The Red Cross deployments highlight valuable insights and are an excellent case study in the principles of human performance and organizational culture. This paper looks at human performance principles, including human fallibility, predictability of error-likely situations, avoiding events by understanding reasons mistakes occur, and the influence on behaviour by organizational factors. This study demonstrates how the Red Cross’s organizational culture and work design positively influenced performance to protect workers and residents/clients. Lastly, this paper shares lessons that can be applied in many workplaces to improve worker health and safety and safety culture. This critical examination is based on the author’s experience as a Senior Occupational Health and Safety Advisor with the Red Cross during the pandemic as part of the team responsible for developing and implementing biological safety practices in long-term care deployments.

Keywords: COVID, human performance, organizational culture, work design

Procedia PDF Downloads 40
261 Biodegradable and Bioactive Scaffold for Bone Tissue Engineering

Authors: A. M. Malagon Escandon, J. A. Arenas Alatorre, C. P. Chaires Rosas, N. A. Vazquez Torres, B. Hernandez Tellez, G. Pinon Zarate, M. Herrera Enriquez, A. E. Castell Rodriguez

Abstract:

The current approach to the treatment of bone defects involves the use of scaffolds that provide a biological and mechanically stable niche to favor tissue repair. Despite the significant progress in the field of bone tissue engineering, several main problems associated are attributed to giving a low biodegradation degree, does not promote osseointegration and regeneration, if the bone is not healing as well as expected or fails to heal, will not be given a proper ossification or new bone formation. The actual approaches of bone tissue regeneration are directed to the use of decellularized native extracellular matrices, which are able of retain their own architecture, mechanic properties, biodegradability and promote new bone formation because they are capable of conserving proteins and other factors that are founded in physiological concentrations. Therefore, we propose an extracellular matrix-based bioscaffolds derived from bovine cancellous bone, which is processed by decellularization, demineralization, and hydrolysis of the collagen protein, these protocols have been successfully carried out in other organs and tissues; the effectiveness of its biosafety has also been previously evaluated in vivo and Food and Drug Administration (FDA) approved. In the specific case of bone, a more complex treatment is needed in comparison with other organs and tissues because is necessary demineralization and collagen denaturalization. The present work was made in order to obtain a temporal scaffold that succeed in degradation in an inversely proportional way to the synthesis of extracellular matrix and the maturation of the bone by the cells of the host.

Keywords: bioactive, biodegradable, bone, extracellular matrix-based bioscaffolds, stem cells, tissue engineering

Procedia PDF Downloads 125
260 Empowering Transformers for Evidence-Based Medicine

Authors: Jinan Fiaidhi, Hashmath Shaik

Abstract:

Breaking the barrier for practicing evidence-based medicine relies on effective methods for rapidly identifying relevant evidence from the body of biomedical literature. An important challenge confronted by medical practitioners is the long time needed to browse, filter, summarize and compile information from different medical resources. Deep learning can help in solving this based on automatic question answering (Q&A) and transformers. However, Q&A and transformer technologies are not trained to answer clinical queries that can be used for evidence-based practice, nor can they respond to structured clinical questioning protocols like PICO (Patient/Problem, Intervention, Comparison and Outcome). This article describes the use of deep learning techniques for Q&A that are based on transformer models like BERT and GPT to answer PICO clinical questions that can be used for evidence-based practice extracted from sound medical research resources like PubMed. We are reporting acceptable clinical answers that are supported by findings from PubMed. Our transformer methods are reaching an acceptable state-of-the-art performance based on two staged bootstrapping processes involving filtering relevant articles followed by identifying articles that support the requested outcome expressed by the PICO question. Moreover, we are also reporting experimentations to empower our bootstrapping techniques with patch attention to the most important keywords in the clinical case and the PICO questions. Our bootstrapped patched with attention is showing relevancy of the evidence collected based on entropy metrics.

Keywords: automatic question answering, PICO questions, evidence-based medicine, generative models, LLM transformers

Procedia PDF Downloads 10
259 Effect of Synchronization Protocols on Serum Concentrations of Estrogen and Progesterone in Holstein Dairy Heifers

Authors: K. Shafiei, A. Pirestani, G. Ghalamkari, S. Safavipour

Abstract:

Use of GnRH or its agonists to increase conception rates should be based on an understanding of GnRH-induced biological effects on the reproductive-endocrine system. This effect may occur through GnRH-stimulated LH surge stimulating production of progesterone by corpus luteum.the aim of this study was to compare the effects on reproductive efficiency of a luteolytic dose of a synthetic prostaglandin Cloprostenol Sodium versus ainjectable progesterone and Luliberin- A on Follicle estrogen and progesterone levels.In this study, we used45 head of holstein dairy heifersin the three treatments, with 15 replicates per treatment were performed in random groups. all the heifers before the projects is began in two steps injection 3 mL CloprostenolSodium with an interval of 11 days been synchronized and 10 days later, second injection of prostaglandin was conducted after that we started below protocol:Control group (daily sodium chloride serum injection 1 cc), Group B: Day Zero, intramuscular injection of 15 mg Luliberin- A + every other day injection of 3 cc progesterone + day 7, injection of Cloprostenol Sodium+ day 9, injection of 15 mg Luliberin- A.Group C: similar to Grop B + daily injection of progesterone after that blood samples was collected and centrifuged.plasma were analysed by ELISA.the analysis of this study uses SPSS data software package and compared between the mean and LS Means LSD test at 5% significance level was used.The results of this study shows that maximum of progesterone plasma levels were in the control gruop (P ≥ 0.05).Therefore, daily injection of progesterone inhibit the growth CL. the most estrogen levels in plasma were in Group C (P ≥ 0.05) thus it can be concluded, rise in endogenous estrogen concentrations normally stimulates the preovulatory LH release in heifers.

Keywords: Luliberin- A, Cloprostenol Sodium, estrogen, progesterone, dairy heifers

Procedia PDF Downloads 511
258 Corticomotor Excitability after Two Different Repetitive Transcranial Magnetic Stimulation Protocols in Ischemic Stroke Patients

Authors: Asrarul Fikri Abu Hassan, Muhammad Hafiz bin Hanafi, Jafri Malin Abdullah

Abstract:

This study is to compare the motor evoked potential (MEP) changes using different settings of repetitive transcranial magnetic stimulation (rTMS) in the post-haemorrhagic stroke patient which treated conservatively. The goal of the study is to determine changes in corticomotor excitability and functional outcome after repetitive transcranial magnetic stimulation (rTMS) therapy regime. 20 post-stroke patients with upper limb hemiparesis were studied due to haemorrhagic stroke. One of the three settings; (I) Inhibitory setting, or (II) facilitatory setting, or (III) control group, no excitatory or inhibitory setting have been applied randomly during the first meeting. The motor evoked potential (MEP) were recorded before and after application of the rTMS setting. Functional outcomes were evaluated using the Barthel index score. We found pre-treatment MEP values of the lesional side were lower compared to post-treatment values in both settings. In contrast, we found that the pre-treatment MEP values of the non-lesional side were higher compared to post-treatment values in both settings. Interestingly, patients with treatment, either facilitatory setting and inhibitory setting have faster motor recovery compared to the control group. Our data showed both settings might improve the MEP of the upper extremity and functional outcomes in the haemorrhagic stroke patient.

Keywords: Barthel index, corticomotor excitability, motor evoked potential, repetitive transcranial magnetic stimulation, stroke

Procedia PDF Downloads 134
257 Using the Minnesota Multiphasic Personality Inventory-2 and Mini Mental State Examination-2 in Cognitive Behavioral Therapy: Case Studies

Authors: Cornelia-Eugenia Munteanu

Abstract:

From a psychological perspective, psychopathology is the area of clinical psychology that has at its core psychological assessment and psychotherapy. In day-to-day clinical practice, psychodiagnosis and psychotherapy are used independently, according to their intended purpose and their specific methods of application. The paper explores how the Minnesota Multiphasic Personality Inventory-2 (MMPI-2) and Mini Mental State Examination-2 (MMSE-2) psychological tools contribute to enhancing the effectiveness of cognitive behavioral psychotherapy (CBT). This combined approach, psychotherapy in conjunction with assessment of personality and cognitive functions, is illustrated by two cases, a severe depressive episode with psychotic symptoms and a mixed anxiety-depressive disorder. The order in which CBT, MMPI-2, and MMSE-2 were used in the diagnostic and therapeutic process was determined by the particularities of each case. In the first case, the sequence started with psychotherapy, followed by the administration of blue form MMSE-2, MMPI-2, and red form MMSE-2. In the second case, the cognitive screening with blue form MMSE-2 led to a personality assessment using MMPI-2, followed by red form MMSE-2; reapplication of the MMPI-2 due to the invalidation of the first profile, and finally, psychotherapy. The MMPI-2 protocols gathered useful information that directed the steps of therapeutic intervention: a detailed symptom picture of potentially self-destructive thoughts and behaviors otherwise undetected during the interview. The memory loss and poor concentration were confirmed by MMSE-2 cognitive screening. This combined approach, psychotherapy with psychological assessment, aligns with the trend of adaptation of the psychological services to the everyday life of contemporary man and paves the way for deepening and developing the field.

Keywords: assessment, cognitive behavioral psychotherapy, MMPI-2, MMSE-2, psychopathology

Procedia PDF Downloads 303
256 Artificial Intelligence in Bioscience: The Next Frontier

Authors: Parthiban Srinivasan

Abstract:

With recent advances in computational power and access to enough data in biosciences, artificial intelligence methods are increasingly being used in drug discovery research. These methods are essentially a series of advanced statistics based exercises that review the past to indicate the likely future. Our goal is to develop a model that accurately predicts biological activity and toxicity parameters for novel compounds. We have compiled a robust library of over 150,000 chemical compounds with different pharmacological properties from literature and public domain databases. The compounds are stored in simplified molecular-input line-entry system (SMILES), a commonly used text encoding for organic molecules. We utilize an automated process to generate an array of numerical descriptors (features) for each molecule. Redundant and irrelevant descriptors are eliminated iteratively. Our prediction engine is based on a portfolio of machine learning algorithms. We found Random Forest algorithm to be a better choice for this analysis. We captured non-linear relationship in the data and formed a prediction model with reasonable accuracy by averaging across a large number of randomized decision trees. Our next step is to apply deep neural network (DNN) algorithm to predict the biological activity and toxicity properties. We expect the DNN algorithm to give better results and improve the accuracy of the prediction. This presentation will review all these prominent machine learning and deep learning methods, our implementation protocols and discuss these techniques for their usefulness in biomedical and health informatics.

Keywords: deep learning, drug discovery, health informatics, machine learning, toxicity prediction

Procedia PDF Downloads 333