Search results for: trauma network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5142

Search results for: trauma network

5022 Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network

Authors: M. Kollar, A. Zieba

Abstract:

In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required.

Keywords: IP scheduled throughput, E-UTRAN, Evolved Universal Terrestrial Radio Access Network, NTP, Network Time Protocol, assymetric network, delay

Procedia PDF Downloads 336
5021 Value Co-Creation Model for Relationships Management

Authors: Kolesnik Nadezda A.

Abstract:

The research aims to elaborate inter-organizational network relationships management model to maximize value co-creation. We propose a network management framework that requires evaluation of network partners with respect to their position and role in network; and elaboration of appropriate relationship development strategy with partners in network. Empirical research and approval is based on the case study method, including structured in-depth interviews with the companies from b2b market.

Keywords: inter-organizational networks, value co-creation, model, B2B market

Procedia PDF Downloads 425
5020 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 345
5019 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 388
5018 How Childhood Trauma Changes the Recovery Models

Authors: John Michael Weber

Abstract:

The following research results spanned six months and 175 people addicted to some form of substance, from alcohol to heroin. One question was asked, and the answers were amazing and consistent. The following work is the detailed results of this writer’s answer to his own question and the 175 that followed. A constant pattern took shape throughout the bio-psycho-social assessments, these addicts had “first memories,” the memories were vivid and took place between the ages of three to six years old, to a person those first memories were traumatic. This writer’s personal search into his childhood was not to find an excuse for the way he became, but to explain the reason for becoming an addict. To treat addiction, these memories that have caused Post Traumatic Stress Disorder (PTSD), must be recognized as the catalyst that sparked a predisposition. Cognitive Behavioral Therapy (CBT), integrated with treatment specifically focused on PTSD, gives the addict a better chance at recovery sans relapse. This paper seeks to give the findings of first memories of the addicts assessed and provide the best treatment plan for such an addict, considering, the childhood trauma in congruence with treatment of the Substance Use Disorder (SUD). The question posed was concerning what their first life memory wa It is the hope of this author to take the knowledge that trauma is one of the main catalysts for addiction, will allow therapists to provide better treatment and reduce relapse from abstinence from drugs and alcohol. This research led this author to believe that if treatment of childhood trauma is not a priority, the twelve steps of Alcoholics Anonymous, specifically steps 4 and 5, will not be thoroughly addressed and odds for relapse increase. With this knowledge, parents can be educated on childhood trauma and the effect it has on their children. Parents could be mindful of the fact that the things they perceive as traumatic, do not match what a child, in the developmental years, absorbs as traumatic. It is this author’s belief that what has become the status quo in treatment facilities has not been working for a long time. It is for that reason this author believes things need to change. Relapse has been woven into the fabric of standard operating procedure and that, in this authors view, is not necessary. Childhood Trauma is not being addressed early in recovery and that creates an environment of inevitable relapse. This paper will explore how to break away from the status -quo and rethink the current “evidencebased treatments.” To begin breaking away from status-quo, this ends the Abstract, with hopes an interest has been peaked to read on.

Keywords: childood, trauma, treatment, addiction, change

Procedia PDF Downloads 51
5017 Utility of Thromboelastography Derived Maximum Amplitude and R-Time (MA-R) Ratio as a Predictor of Mortality in Trauma Patients

Authors: Arulselvi Subramanian, Albert Venencia, Sanjeev Bhoi

Abstract:

Coagulopathy of trauma is an early endogenous coagulation abnormality that occurs shortly resulting in high mortality. In emergency trauma situations, viscoelastic tests may be better in identifying the various phenotypes of coagulopathy and demonstrate the contribution of platelet function to coagulation. We aimed to determine thrombin generation and clot strength, by estimating a ratio of Maximum amplitude and R-time (MA-R ratio) for identifying trauma coagulopathy and predicting subsequent mortality. Methods: We conducted a prospective cohort analysis of acutely injured trauma patients of the adult age groups (18- 50 years), admitted within 24hrs of injury, for one year at a Level I trauma center and followed up on 3rd day and 5th day of injury. Patients with h/o coagulation abnormalities, liver disease, renal impairment, with h/o intake of drugs were excluded. Thromboelastography was done and a ratio was calculated by dividing the MA by the R-time (MA-R). Patients were further stratified into sub groups based on the calculated MA-R quartiles. First sampling was done within 24 hours of injury; follow up on 3rd and 5thday of injury. Mortality was the primary outcome. Results: 100 acutely injured patients [average, 36.6±14.3 years; 94% male; injury severity score 12.2(9-32)] were included in the study. Median (min-max) on admission MA-R ratio was 15.01(0.4-88.4) which declined 11.7(2.2-61.8) on day three and slightly rose on day 5 13.1(0.06-68). There were no significant differences between sub groups in regard to age, or gender. In the lowest MA-R ratios subgroup; MA-R1 (<8.90; n = 27), injury severity score was significantly elevated. MA-R2 (8.91-15.0; n = 23), MA-R3 (15.01-19.30; n = 24) and MA-R4 (>19.3; n = 26) had no difference between their admission laboratory investigations, however slight decline was observed in hemoglobin, red blood cell count and platelet counts compared to the other subgroups. Also significantly prolonged R time, shortened alpha angle and MA were seen in MA-R1. Elevated incidence of mortality also significantly correlated with on admission low MA-R ratios (p 0.003). Temporal changes in the MA-R ratio did not correlated with mortality. Conclusion: The MA-R ratio provides a snapshot of early clot function, focusing specifically on thrombin burst and clot strength. In our observation, patients with the lowest MA-R time ratio (MA-R1) had significantly increased mortality compared with all other groups (45.5% MA-R1 compared with <25% in MA-R2 to MA-R3, and 9.1% in MA-R4; p < 0.003). Maximum amplitude and R-time may prove highly useful to predict at-risk patients early, when other physiologic indicators are absent.

Keywords: coagulopathy, trauma, thromboelastography, mortality

Procedia PDF Downloads 133
5016 Simulation Analysis of Optical Add Drop Multiplexer in a Ring Network

Authors: Surinder Singh, Meenakshi

Abstract:

In this paper MZI-FBG based optical add drop multiplexer is designed and its performance is analyzed in the ring network. In the ring network nodes are composed of optical add drop multiplexer, transmitter and receiver. OADM is used to add or drop any frequency at intermediate nodes without affecting other channels. In this paper the performance of the ring network is carried out by varying various kinds of fiber with or without amplifiers.

Keywords: OADM, ring network, MZI-FBG, transmitter

Procedia PDF Downloads 542
5015 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 420
5014 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture

Authors: Yong Xue, Daniel A. Menascé

Abstract:

Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.

Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain

Procedia PDF Downloads 499
5013 Implementation of an Associative Memory Using a Restricted Hopfield Network

Authors: Tet H. Yeap

Abstract:

An analog restricted Hopfield Network is presented in this paper. It consists of two layers of nodes, visible and hidden nodes, connected by directional weighted paths forming a bipartite graph with no intralayer connection. An energy or Lyapunov function was derived to show that the proposed network will converge to stable states. By introducing hidden nodes, the proposed network can be trained to store patterns and has increased memory capacity. Training to be an associative memory, simulation results show that the associative memory performs better than a classical Hopfield network by being able to perform better memory recall when the input is noisy.

Keywords: restricted Hopfield network, Lyapunov function, simultaneous perturbation stochastic approximation

Procedia PDF Downloads 101
5012 Closing the Front Door of Child Protection: Rethinking Mandated Reporting

Authors: Miriam Itzkowitz, Katie Olson

Abstract:

Through an interdisciplinary and trauma-responsive lens, this article reviews the legal and social history of mandated reporting laws and family separation, examines the ethical conundrum of mandated reporting as it relates to evidence-based practice, and discusses alternatives to mandated reporting as a primary prevention strategy. Using existing and emerging data, the authors argue that mandated reporting as a universal strategy contributes to racial disproportionality in the child welfare system and that anti-racist practices should begin with an examination of our reliance on mandated reporting.

Keywords: child welfare, education, mandated reporting, racial disproportionality, trauma

Procedia PDF Downloads 299
5011 The Prevalence of Intubation Induced Dental Complications among Hospitalized Patients

Authors: Dorsa Rahi, Arghavan Tonkanbonbi, Soheila Manifar, Behzad Jafvarnejad

Abstract:

Background and Aim: Intraoral manipulation is performed during endotracheal intubation for general anesthesia, which can traumatize the soft and hard tissue in the oral cavity and cause postoperative pain and discomfort. Dental trauma is the most common complication of intubation. This study aimed to assess the prevalence of dental complications due to intubation in patients hospitalized in Imam Khomeini Hospital during 2018-2019. Materials and Methods: A total of 805 patients presenting to the Cancer Institute of Imam Khomeini Hospital for preoperative anesthesia consultation were randomly enrolled. A dentist interviewed the patients and performed a comprehensive clinical oral examination preoperatively. The patients underwent clinical oral examination by another dentist postoperatively. Results: No significant correlation was found between dental trauma (tooth fracture, tooth mobility, or soft tissue injury) after intubation with the age or gender of patients. According to the Wilcoxon test and McNemar-Bowker Test, the rate of mobility before the intubation was significantly different from that after the intubation (P=0.000). Maxillary central incisors, maxillary left canine and mandibular right and left central incisors had the highest rate of fracture. Conclusion: Mobile teeth before the intubation are at higher risk of avulsion and aspiration during the procedure. Patients with primary temporomandibular joint disorders are more susceptible to post-intubation trismus.

Keywords: oral trauma, dental trauma, intubation, anesthesia

Procedia PDF Downloads 121
5010 Designing Directed Network with Optimal Controllability

Authors: Liang Bai, Yandong Xiao, Haorang Wang, Songyang Lao

Abstract:

The directedness of links is crucial to determine the controllability in complex networks. Even the edge directions can determine the controllability of complex networks. Obviously, for a given network, we wish to design its edge directions that make this network approach the optimal controllability. In this work, we firstly introduce two methods to enhance network by assigning edge directions. However, these two methods could not completely mitigate the negative effects of inaccessibility and dilations. Thus, to approach the optimal network controllability, the edge directions must mitigate the negative effects of inaccessibility and dilations as much as possible. Finally, we propose the edge direction for optimal controllability. The optimal method has been found to be successfully useful on real-world and synthetic networks.

Keywords: complex network, dynamics, network control, optimization

Procedia PDF Downloads 145
5009 Progression of Trauma: Myth Mess Mastery, Addressing and Grooming

Authors: Stuart Bassman

Abstract:

Services that focus on the synthesis of research and clinical practice are vital in providing efficacious change for the men and women who have been victims of childhood sexual abuse. This study will address what processes have been helpful in being a catalyst in changing one’s inner life as well as providing meaningful applications and fulfilling experiences. Initially, we would focus on the Myths regarding childhood sexual abuse. This would include Grooming behaviors and Delayed Disclosures. Subsequently, we would address the Mess that follows from not recognizing the adverse impairments that result from Childhood Sexual Abuse. Finally, we would conclude by looking at the Mastery that could arise from moving from being a Victim to a Survivor and a Thriver.

Keywords: trauma, childhood, somatic, treatment

Procedia PDF Downloads 18
5008 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 356
5007 Introduction of Digital Radiology to Improve the Timeliness in Availability of Radiological Diagnostic Images for Trauma Care

Authors: Anuruddha Jagoda, Samiddhi Samarakoon, Anil Jasinghe

Abstract:

In an emergency department ‘where every second count for patient’s management’ timely availability of X- rays play a vital role in early diagnosis and management of patients. Trauma care centers rely heavily on timely radiologic imaging for patient care and radiology plays a crucial role in the emergency department (ED) operations. A research study was carried out to assess timeliness of availability of X-rays and total turnaround time at the Accident Service of National Hospital of Sri Lanka which is the premier trauma center in the country. Digital Radiology system was implemented as an intervention to improve the timeliness of availability of X-rays. Post-implementation assessment was carried out to assess the effectiveness of the intervention. Reduction in all three aspects of waiting times namely waiting for initial examination by doctors, waiting until X –ray is performed and waiting for image availability was observed after implementation of the intervention. However, the most significant improvement was seen in waiting time for image availability and reduction in time for image availability had indirect impact on reducing waiting time for initial examination by doctors and waiting until X –ray is performed. The most significant reduction in time for image availability was observed when performing 4-5 X rays with DR system. The least improvement in timeliness was seen in patients who are categorized as critical.

Keywords: emergency department, digital radilogy, timeliness, trauma care

Procedia PDF Downloads 229
5006 Multimodal Convolutional Neural Network for Musical Instrument Recognition

Authors: Yagya Raj Pandeya, Joonwhoan Lee

Abstract:

The dynamic behavior of music and video makes it difficult to evaluate musical instrument playing in a video by computer system. Any television or film video clip with music information are rich sources for analyzing musical instruments using modern machine learning technologies. In this research, we integrate the audio and video information sources using convolutional neural network (CNN) and pass network learned features through recurrent neural network (RNN) to preserve the dynamic behaviors of audio and video. We use different pre-trained CNN for music and video feature extraction and then fine tune each model. The music network use 2D convolutional network and video network use 3D convolution (C3D). Finally, we concatenate each music and video feature by preserving the time varying features. The long short term memory (LSTM) network is used for long-term dynamic feature characterization and then use late fusion with generalized mean. The proposed network performs better performance to recognize the musical instrument using audio-video multimodal neural network.

Keywords: multimodal, 3D convolution, music-video feature extraction, generalized mean

Procedia PDF Downloads 188
5005 Design of Distribution Network for Gas Cylinders in Jordan

Authors: Hazem J. Smadi

Abstract:

Performance of a supply chain is directly related to a distribution network that entails the location of storing materials or products and how products are delivered to the end customer through different stages in the supply chain. This study analyses the current distribution network used for delivering gas cylinders to end customer in Jordan. Evaluation of current distribution has been conducted across customer service components. A modification on the current distribution network in terms of central warehousing in each city in the country improves the response time and customer experience. 

Keywords: distribution network, gas cylinder, Jordan, supply chain

Procedia PDF Downloads 435
5004 From Victim to Ethical Agent: Oscar Wilde's The Ballad of Reading Gaol as Post-Traumatic Writing

Authors: Mona Salah El-Din Hassanein

Abstract:

Faced with a sudden, unexpected, and overwhelming event, the individual's normal cognitive processing may cease to function, trapping the psyche in "speechless terror", while images, feelings and sensations are experienced with emotional intensity. Unable to master such situation, the individual becomes a trauma victim who will be susceptible to traumatic recollections like intrusive thoughts, flashbacks, and repetitive re-living of the primal event in a way that blurs the distinction between past and present, and forecloses the future. Trauma is timeless, repetitious, and contagious; a trauma observer could fall prey to "secondary victimhood". Central to the process of healing the psychic wounds in the aftermath of trauma is verbalizing the traumatic experience (i.e., putting it into words) – an act which provides a chance for assimilation, testimony, and reevaluation. In light of this paradigm, this paper proposes a reading of Oscar Wilde's The Ballad of Reading Gaol, written shortly after his release from prison, as a post-traumatic text which traces the disruptive effects of the traumatic experience of Wilde's imprisonment for homosexual offences and the ensuing reversal of fortune he endured. Post-traumatic writing demonstrates the process of "working through" a trauma which may lead to the possibility of ethical agency in the form of a "survivor mission". This paper draws on fundamental concepts and key insights in literary trauma theory which is characterized by interdisciplinarity, combining the perspectives of different fields like critical theory, psychology, psychiatry, psychoanalysis, history, and social studies. Of particular relevance to this paper are the concepts of "vicarious traumatization" and "survivor mission", as The Ballad of Reading Gaol was written in response to Wilde's own prison trauma and the indirect traumatization he experienced as a result of witnessing the execution of a fellow prisoner whose story forms the narrative base of the poem. The Ballad displays Wilde's sense of mission which leads him to recognize the social as well as ethical implications of personal tragedy. Through a close textual analysis of The Ballad of Reading Gaol within the framework of literary trauma theory, the paper aims to: (a) demonstrate how the poem's thematic concerns, structure and rhetorical figures reflect the structure of trauma; (b) highlight Wilde's attempts to come to terms with the effects of the cataclysmic experience which transformed him into a social outcast; and (c) show how Wilde manages to transcend the victim status and assumes the role of ethical agent to voice a critique of the Victorian penal system and the standards of morality underlying the cruelties practiced against wrong doers and to solicit social action.

Keywords: ballad of reading of reading, post-traumatic writing, trauma theory, Wilde

Procedia PDF Downloads 161
5003 A Perspective on Emergency Care of Gunshot Injuries in Northern Taiwan

Authors: Liong-Rung Liu, Yu-Hui Chiu, Wen-Han Chang

Abstract:

Firearm injuries are high-energy injuries. The ballistic pathways could cause severe burns or chemical damages to vessels, musculoskeletal or other major organs. The high mortality rate is accompanied by complications such as sepsis. As laws prohibit gun possession, civilian gunshot wounds (GSW) are relatively rare in Taiwan. Our hospital, Mackay Memorial Hospital, located at the center of Taipei city is surrounded by nightclubs and red-light districts. Due to this unique location, our hospital becomes the first-line trauma center managing gunshot victims in Taiwan. To author’s best knowledge, there are few published research articles regarding this unique situation. We hereby analyze the distinct characteristics and length of stay (LOS) of GSW patients in the emergency room (ER) at Mackay Memorial Hospital. A 6-year retrospective analysis of 27 patients treated for GSW injuries from January 2012 to December 2017 was performed. The patients’ records were reviewed for the following analyses, 1) wound position and the correlated clinical presentations; 2) the LOS in ED of patients receiving emergency surgery for major organ or vascular injuries. We found males (96.3%) were injured by guns more often than females (3.7%) in all age groups. The most common injured site was in the extremities. With regards to the ER LOS, the average time were 72.2 ± 34.5 minutes for patients with triage I and 207.4 ± 143.9 minutes for patients with triage II. The ED LOS of patients whose ISS score were more than 15 was 59.9 ± 25.6 minutes, and 179.4 ± 119.8 minutes for patients whose ISS score were between 9 to 15, respectively. Among these 27 patients, 10 patients had emergency surgery and their average ED stay time was 104.5 ± 33.3 minutes. Even more, the average ED stay time could be shortened to 88.8 ± 32.3 minutes in the 5 patients with trauma team activation. In conclusion, trauma team activation in severe GSW patients indeed shortens the ED LOS and might initially improve the quality of patient care. This is the result of better trauma systems, including advances in care from emergency medical services and acute care surgical management.

Keywords: gunshot, length of stay, trauma, mortality

Procedia PDF Downloads 108
5002 Changes in the Quality of Life of Turkish Patients with Trauma-Related Phthisis Bulbi

Authors: Titap Yazicioglu

Abstract:

Purpose: Losing an eye due to trauma is a challenging situation that reduces the quality of life by causing physical, cosmetic, and serious psychological problems. This study aimed to evaluate the effect of aesthetic rehabilitation on the change in psychological status and quality of life of patients with eye loss resulting in phthisis bulbi. Materials and Methods: The files of 25 males and 15 females with an average age of 27.5 years who had trauma-related phthisic eye and had applied to the Department of Ophthalmology at the Dr. Lütfi Kırdar Kartal Education and Research Hospital, Istanbul, Turkey, for aesthetic rehabilitation during the years 2015-19 were retrospectively analyzed. The Beck Depression Inventory (BDI), Beck Anxiety Scale(BAS), and Short Form 36 quality-of-life survey (SF-36) were used to collect data on admission and one-year follow-up. Results: Of the patients reviewed, 65% stated that eye loss had caused their avoidance of family and social environments; 30% had moderate anxiety and depression. The post-operative sub-dimension scores of general health, emotional role function, and physical and social functions were statistically significant (p = 0.001; p<0.01), but the variations in the sub-dimension scores of vitality, mental health, and total physical health were not (p>0.05). Conclusion: Lossing an eye is a traumatic event that can affect all aspects of a person’s social and professional life. A patient who has suffered from the psychological damage of physical loss of eye needs a prosthesis that can give the desired function and appearance in different aspects of life.

Keywords: eye loss, phthisis bulbi, quality of life, psychological trauma

Procedia PDF Downloads 94
5001 A Survey of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

Authors: R. Poonkuzhali, M. Y. Sanavullah, M. R. Gurupriya

Abstract:

Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay Tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic routing techniques used in MANET.

Keywords: ETX, opportunistic routing, PSR, throughput

Procedia PDF Downloads 467
5000 Resiliency in Fostering: A Qualitative Study of Highly Experienced Foster Parents

Authors: Ande Nesmith

Abstract:

There is an ongoing shortage of foster parents worldwide to take on a growing population of children in need of out-of-home care. Currently, resources are primarily aimed at recruitment rather than retention. Retention rates are extraordinarily low, especially in the first two years of fostering. Qualitative interviews with 19 foster parents averaging 20 years of service provided insight into the challenges they faced and how they overcame them. Thematic analysis of interview transcripts identified sources of stress and resiliency. Key stressors included lack of support and responsiveness from the children’s social workers, false maltreatment allegations, and secondary trauma from children’s destructive behaviors and emotional dysregulation. Resilient parents connected with other foster parents for support, engaged in creative problem-solving, recognized that positive feedback from children usually arrives years later, and through training, understood the neurobiological impact of trauma on child behavior. Recommendations include coordinating communication between the foster parent licensing agency social workers and the children’s social workers, creating foster parent support networks and mentoring, and continuous training on trauma including effective parenting strategies. Research is needed to determine whether these resilience indicators in fact lead to long-term retention. Policies should include a mechanism to develop a cohesive line of communication and connection between foster parents and the children’s social workers as well as their respective agencies.

Keywords: foster care stability, foster parent burnout, foster parent resiliency, foster parent retention, trauma-informed fostering

Procedia PDF Downloads 321
4999 Software-Defined Networks in Utility Power Networks

Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian

Abstract:

Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.

Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller

Procedia PDF Downloads 80
4998 Migrant Youth: Trauma-Informed Interventions

Authors: Nancy Daly

Abstract:

Migrant youth who have experienced traumatic events in their home countries or in their passage to the United States may require interventions or formal services to support varying levels and types of needs. The manner in which such youth are engaged and evaluated, as well as the framework of evaluation, can impact their educational services and placement. Evidenced-based trauma-informed practices that engage and support migrant youth serve as an important bridge to stabilization; however, ensuring long-term growth may require a range of integrated services, including special education and mental health services. Special education evaluations which consider the eligibility of Emotional Disturbance for migrant youth must carefully weigh issues of mental health needs against the exclusionary criteria of lack of access to education, limited language skills, as well as other environmental factors. Case studies of recently arrived migrant youth reveal both commonalities and differences in types and levels of need which underscores the importance of adept evaluation and case management to ensure the provision of services that support growth and resiliency.

Keywords: migrant youth, trauma-informed care, mental health services, special education

Procedia PDF Downloads 90
4997 Data Clustering in Wireless Sensor Network Implemented on Self-Organization Feature Map (SOFM) Neural Network

Authors: Krishan Kumar, Mohit Mittal, Pramod Kumar

Abstract:

Wireless sensor network is one of the most promising communication networks for monitoring remote environmental areas. In this network, all the sensor nodes are communicated with each other via radio signals. The sensor nodes have capability of sensing, data storage and processing. The sensor nodes collect the information through neighboring nodes to particular node. The data collection and processing is done by data aggregation techniques. For the data aggregation in sensor network, clustering technique is implemented in the sensor network by implementing self-organizing feature map (SOFM) neural network. Some of the sensor nodes are selected as cluster head nodes. The information aggregated to cluster head nodes from non-cluster head nodes and then this information is transferred to base station (or sink nodes). The aim of this paper is to manage the huge amount of data with the help of SOM neural network. Clustered data is selected to transfer to base station instead of whole information aggregated at cluster head nodes. This reduces the battery consumption over the huge data management. The network lifetime is enhanced at a greater extent.

Keywords: artificial neural network, data clustering, self organization feature map, wireless sensor network

Procedia PDF Downloads 486
4996 Human Immune Response to Surgery: The Surrogate Prediction of Postoperative Outcomes

Authors: Husham Bayazed

Abstract:

Immune responses following surgical trauma play a pivotal role in predicting postoperative outcomes from healing and recovery to postoperative complications. Postoperative complications, including infections and protracted recovery, occur in a significant number of about 300 million surgeries performed annually worldwide. Complications cause personal suffering along with a significant economic burden on the healthcare system in any community. The accurate prediction of postoperative complications and patient-targeted interventions for their prevention remain major clinical provocations. Recent Findings: Recent studies are focusing on immune dysregulation mechanisms that occur in response to surgical trauma as a key determinant of postoperative complications. Antecedent studies mainly were plunging into the detection of inflammatory plasma markers, which facilitate in providing important clues regarding their pathogenesis. However, recent Single-cell technologies, such as mass cytometry or single-cell RNA sequencing, have markedly enhanced our ability to understand the immunological basis of postoperative immunological trauma complications and to identify their prognostic biological signatures. Summary: The advent of proteomic technologies has significantly advanced our ability to predict the risk of postoperative complications. Multiomic modeling of patients' immune states holds promise for the discovery of preoperative predictive biomarkers and providing patients and surgeons with information to improve surgical outcomes. However, more studies are required to accurately predict the risk of postoperative complications in individual patients.

Keywords: immune dysregulation, postoperative complications, surgical trauma, flow cytometry

Procedia PDF Downloads 60
4995 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 135
4994 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 377
4993 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 290