279 research outputs found
An extension method for t-norms on subintervals to t-norms on bounded lattices
summary:In this paper, a construction method on a bounded lattice obtained from a given t-norm on a subinterval of the bounded lattice is presented. The supremum distributivity of the constructed t-norm by the mentioned method is investigated under some special conditions. It is shown by an example that the extended t-norm on from the t-norm on a subinterval of need not be a supremum-distributive t-norm. Moreover, some relationships between the mentioned construction method and the other construction methods in the literature are presented
Generating methods for principal topologies on bounded lattices
summary:In this paper, some generating methods for principal topology are introduced by means of some logical operators such as uninorms and triangular norms and their properties are investigated. Defining a pre-order obtained from the closure operator, the properties of the pre-order are studied
Notch Signalling Synchronizes the Zebrafish Segmentation Clock but Is Not Needed To Create Somite Boundaries
Somite segmentation depends on a gene expression oscillator or clock in the posterior presomitic mesoderm (PSM) and on read-out machinery in the anterior PSM to convert the pattern of clock phases into a somite pattern. Notch pathway mutations disrupt somitogenesis, and previous studies have suggested that Notch signalling is required both for the oscillations and for the read-out mechanism. By blocking or overactivating the Notch pathway abruptly at different times, we show that Notch signalling has no essential function in the anterior PSM and is required only in the posterior PSM, where it keeps the oscillations of neighbouring cells synchronized. Using a GFP reporter for the oscillator gene her1, we measure the influence of Notch signalling on her1 expression and show by mathematical modelling that this is sufficient for synchronization. Our model, in which intracellular oscillations are generated by delayed autoinhibition of her1 and her7 and synchronized by Notch signalling, explains the observations fully, showing that there are no grounds to invoke any additional role for the Notch pathway in the patterning of somite boundaries in zebrafish
Recurrence of atretic parietal cephalocele in adult: a case report and review of literature
Common presentation of atretic parietal cephalocele is mostly seen in infants and young children. It is a palpable midline parietal soft tissue mass which is thought to represent involuted true cephalocele (meningocele or encephalocele) connected to dura mater via a fibrous stalk. Atretic parietal cephalocele is associated with increased incidence of intracranial anomalies.. Parietal cephaloceles comprise about 1% of all cerebrospinal congenital malformations and 10% of cephaloceles. We report here the case of an atretic parietal cephalocele with no associated brain malformations in adult
Алгоритми та програмні рішення для тестування вразливості в інтерфейсі SQL у веб-програмах
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection vulnerability which can violate the confidentiality and integrity principles of the CIA triad is reviewed, and SQL injection attack execution and protection techniques are explained. The common frameworks’ solutions against SQL injection vulnerability were compared, and this comparison shown the most used techniques in this domain. Error-based and time-based detection algorithms for SQL injection’s identification are developed to create a vulnerability scanner that can detect SQL attacks which cause vulnerability in web applications, and these algorithms are represented in form of UML-activity diagrams. In order to discover all possible links and forms to perform SQL injection vulnerability tests in the entire website, a web crawler is needed. Breadth-First Search (BFS) algorithm for developing the web crawler is proposed, and the appropriate pseudo code and activity diagram are provided. Besides, Common Vulnerability Scoring System (CVSS) that is used to measure severity score of attacks that can violate CIA triad principles is reviewed. Qualitative severity score rating scale of CVSS is explained. An example of CVSS calculation is represented. Necessary components of a vulnerability scanner are explained. A vulnerability scanner prototype is developed using explained algorithms. Process results of this vulnerability scanner’s usage for real web applications are represented. Conclusions are made, and goals of future work are defined.Безпека програмного забезпечення щоденно набуває все більшого значення, і розробники намагаються максимально захистити веб-програми, щоб забезпечити їх конфіденційність, цілісність та доступність, які описані в основній моделі безпеки так званої тріади CIA. Розглянута вразливість SQL-ін'єкцій, яка може порушувати принципи конфіденційності та цілісності тріади ЦРУ та пояснюються виконання SQL-атак та методи захисту від них. Було проведено порівняння загальних структурних рішень для усунення вразливості SQL-ін’єкцій, яке виявило найпоширеніші технології у цій галузі. Розроблені алгоритми виявлення на основі помилок та на основі вимірі часу для ідентифікації SQL-ін’єкцій для створення сканера вразливості, який може виявити SQL-атаки, що викликають уразливість в веб-додатках, і ці алгоритми представлені у формі UML-діаграм активності. Щоб виявити всі можливі посилання та форми для виконання тестів вразливості на всьому веб-сайті, потрібен пошуковий веб-робот. Запропоновано алгоритм Breadth-First Search (BFS) для розробки веб-сканеру, для нього наведено псевдокод та діаграма активності. Розглядається система загальної оцінки вразливості (CVSS), яка використовується для вимірювання ступеня тяжкості атак, що можуть порушувати принципи захисту тріади ЦРУ. Роз'яснено якісну оціночну шкалу CVSS. Представлений приклад розрахунку CVSS. Розроблено прототип сканера вразливості з використанням запропонованих алгоритмів. Результати застосування цього сканеру вразливості представлені прикладами оцінки реальних веб-застосувань. Зроблено висновки, визначені цілі майбутньої роботи
Single-port laparoscopic left colectomy for colo-colonic intussusception caused by giant lipoma
Laparoscopic surgery for colorectal disease has beenshown to improve postoperative healing compared withopen surgery. Specifically, studies suggest that laparoscopictechniques can reduce postoperative pain andrecovery time, reduce the need for postoperative analgesia,and allow a more rapid return to normal activitiescompared with open surgery. A series of cases have beenreported in the literature concerning the success rate ofsingle-incision laparoscopic colectomy used in the treatmentof benign or malign colorectal disease. A 38-year-oldfemale patient having chronic cramping abdominal pain,who’s descending colon included a giant lipoma causingintussusceptions. Lipoma was detected by colonoscopy,the histological examination revealed lipoma and thenwas operated with single port laparoscopic left colectomyin elective conditions. No intraoperative and postoperativecomplications occurred. The operation time was 105minutes. The wound size was 2.5 cm. The patient wasdischarged uneventfully on postoperative day four.Key words: Lipoma, colo-colonic intussusceptions, singleincisio
Splenic artery angiography: clinical classification of origin and branching variations of splenic artery by multi-detector computed tomography angiography method
Background: The splenic artery (SA) variations are rarely reported in the literature. Knowledge of the range of the SA and other arterial anomalies and their specific frequencies is very important ever for every visceral surgeon as well as for treatment of gastrointestinal bleeding, organ transplantation, transarterial chemoembolisation of neoplasm, infusion therapy, therapeutic arterial ligation, iatrogenic injuries. At the literature, there are more studies on the coeliac trunk, superior mesenteric artery and hepatic artery variations, but studies on the SA variations are uncommon. The studies on the SA variations are mostly in the form of case reports, but there are not many studies with large population on this issue. The purpose of this study was to evaluate the SA alone and to determine the variations determined separately from the other arteries. Accurate awareness of all the possible anatomic variations is crucial in the upper abdomen surgery.
Materials and methods: Seven hundred fifty patients undergoing multi-detector computed tomography angiography between 2015 and 2017 were retrospectively evaluated for the SA variations. We created a new classification system to determine anatomic variations of the SA.
Results: Twenty-three different types were identified related to anatomic variations in the origin and branching pattern of the SA. While 596 (79.47%) patients had standard SA anatomy, 154 (20.53%) patients had variant SA anatomy.
Conclusions: The SA has quite different variation types and the practical context of the issue is of primary importance in surgery, gastroenterology, oncology and radiology. Liver and pancreas transplantation, splenectomy, embolisation of tumours of the abdominal organs, as well as other numerous diagnostic and therapeutic procedures, require detailed anatomical knowledg
Crimean-Congo hemorrhagic fever
Crimean-Congo hemorrhagic fever (CCHF) is a fatal viral infection by Crimean-Congo hemorrhagic fever virus (CCHFV). Crimean-Congo hemorrhagic fever virus which is member of the Bunyaviridae family, Nairovirus genus is transmitted to humans through infected ticks. Crimean-Congo hemorrhagic fever was first recognized in the Crimean peninsula in 1944. The disease now occurs frequently throughout Asia, Africa, Eastern Europe and the Middle East. First cases have been reported in Turkey in 2002. 1820 cases and 92 deaths were reported until 2007. In our country, cases have especially been seen northern-east Anatolia. There has been a substantial increase in cases reports from the west part ofTurkey recently. HoweverAydın is nonendemic, first cases detected in 2006 and the number of cases have been reached 29.We aimed to inform on Crimean-Congo hemorrhagic fever and to analyze the clinical properties of detected casesKırım Kongo Kanamalı Ateşi (KKKA) KKKA virüsü (KKKAV) tarafından oluşturulan bazen ölümcül olabilen viral bir hastalıktır. KKKA virüsü (KKKAV) Bunyaviridae ailesinin Nairovirus cinsine ait olup keneler tarafından insanlara bulaştırılır. KKKA ilk kez 1944'de Kırım'da ortaya çıkmıştır. Günümüzde hastalık sıklıkla Asya, Afrika doğu Avrupa ve orta doğuda epidemiler yapmaktadır. Ülkemizde ilk olgular 2002 yılında rapor edilmiştir. Hasta sayısı, 2007 yılına kadar 1820'ye yaşamını yitirenlerin sayısı ise 92'ye ulaşmıştır. Hastalık ülkemizde özellikle kuzeydoğu Anadolu'da görülmekle birlikte son yıllarda batı illerinden de olgu bildirimlerinde artışlar söz konusudur. Aydın ili hastalık açısından nonendemik kabul edilmesine karsın ilk olgular 2006 yılında saptanmış ve görülen olgu sayısı 29'a ulaşmıştır. Bu yazıda KKKA ile ilgili genel bilgilerin verilmesi ile birlikte ilimizde görülen olguların klinik analizlerinin yapılması amaçlanmıştır
The Relationship Between Burnout Syndrome and Organizational Commitment Perception of Employees in Fast Moving Consumer Goods Industry
Purpose – The aim of this research is to identify the relationship between burnout syndrome and organizational commitment perception of employees. Design/methodology/approach – Within the framework of the existing literature, two Likert type scales were used to measure the conceptual structures. The measurement tools were distributed to 475 participants made up of sales employees employed by companies operating in the fast-moving consumer goods industry in Istanbul. In total, 445 valid questionnaires were gathered for statistical analysis. The research was conducted by IBM SPSS 22.0 and AMOS 23.0 software. In total, 10 hypotheses, including all the sub-dimensions, were investigated through statistical analysis. Findings – It has been concluded that there is a significant, linear, and negative relationship between two conceptual structures and their sub-dimensions. It has also been observed that there is a statistically significant, linear, moderate, and negative correlation between burnout syndrome and organizational commitment (r = -0.362, p = 0.00 <0.05). Discussion – Employees experiencing burnout syndrome have lower levels of organizational commitment; and therefore, managers should work on reducing the probability of burnout syndrome of individuals within the organizations. The findings are limited to the perceptions of 445 employees and the sample consists of employees working in a single industry in Istanbul. The analysis can be expanded further to cover other industries and employees in the future studies
- …