11 research outputs found

    Escaping the Echo: Understanding the Impact of Social Media on Overconcentration of Emerging Technology Security Threats

    Get PDF
    Social media platforms prioritize sensational or trending content, often overshadowing less popular but important topics and hindering discourse diversification. They evolve into echo chambers, where users predominantly encounter views aligned with their own. Security threat awareness for emerging technologies remains restricted, primarily because of the overconcentration of discussions influenced by both human and algorithmic factors. We seek to identify security threats related to emerging technology that are overshadowed and underrepresented due to the overconcentration of others. Next, we study uncertainty reduction approaches and emotional appraisal dimensions to understand how they contribute to the amplification or overconcentration of specific security threats. By combining computational NLP techniques to detect overconcentrated topics with scenario-based factorial surveys, this study proposes to provide a thorough examination of threat amplification in the realm of social media

    Honey as a potent natural supplement for diverse human ailments

    Get PDF
    Abstract The use of natural honey (NH) as a medicinal agent is associated with a vast range of health benefits and therapeutic promises. The tradition of using honey as a potent food supplementation and medicinal component exist in several countries cutting across traditions and civilizations. This review revisits the wide spectrum of medicinal properties that are associated with honey in the light of modern research and attempts to impart the much needed data required to provide this natural food the status of evidence based medicine. Subjects as diverse as diabetes, cardiology and ophthalmology were covered where beneficial medical properties of honey has been demonstrated and the review was concluded by identifying few safety aspects that are required to be known while using natural, unprocessed honey

    Post-operative Day 1 versus Day 0 follow-up for Uncomplicated Cataract Surgeries: A comparison of post-operative outcomes and managements

    Get PDF
    Purpose: To compare the postoperative outcomes and management of uncomplicated cataract surgery (CEIOL) patients seen on post-operative day zero (POD 0) versus post-operative day one (POD 1). Methods: A retrospective chart review of 533 patients who had CEIOL at the Kresge Eye Institute from December 2017 to September 2019 was performed. Visual acuity (VA) and intraocular pressure (IOP) were collected from the pre-operative visit, and the first and second post-operative day visits. In addition, changes in management were recorded from the first post-operative day visit. Patients were excluded if they had a complex cataract procedure, had combined glaucoma filtering surgery, or did not complete two follow up visits within 14 days of surgery. Results: The pre-operative demographic data between patients seen on POD 0 (n=119) versus POD1 (N=414) were equally distributed. By unpaired t-test, the average VA of patients seen on POD 1 was significantly better than those seen on POD 0 (P0.50). Conclusion: There was no significant difference in management between POD 0 and POD 1 patients having undergone uncomplicated cataract surgeries. Therefore, surgeons can safely consider POD 0 or POD 1 evaluations for uncomplicated cataract surgeries and improve healthcare cost efficiency for CEIOL

    Eustachian and tricuspid valve endocarditis: A rare consequence of the automatic implantable cardioverter-defibrillator placement

    No full text
    Eustachian valve (EV) is usually a rudimentary structure in adults. It is an embryological remnant of sinus venosus that directs oxygenated blood from the inferior vena cava across the foramen ovale and into the left atrium. Intravenous drug use is most commonly associated with infective endocarditis of the right-sided heart structures. Other documented causes of such an occurrence are intracardiac devices like pacemakers and central venous catheters. Patients presenting with concerns of infection and embolic phenomenon should promptly undergo evaluation for infective endocarditis. Although an embryological remnant, the eustachian valve normally regresses after birth, except in a minority of the patients, it persists as a vestigial structure. Here we present an unusual case involving infective endocarditis of the eustachian valve and tricuspid valve both in a patient with recent automatic implantable cardioverter-defibrillator (AICD) placement and history of IV drug abuse and its systemic consequences in a patient with patent foramen ovale

    Exploring the “Bright Side” of Technology Use

    Get PDF

    Rare e14a3 (b3a3) BCR-ABL Fusion in Chronic Myeloid Leukemia in India: The Threats and Challenges in Monitoring Minimal Residual Disease (MRD)

    No full text
    Objective: The primary objective of this work was to confirm the occurrence of rare BCR ABL fusion variant involving the a3 region of the ABL gene in a patient positive for t(9;22) translocation but negative for common major and minor breakpoint cluster regions and the challenges and threats that it poses in a routine laboratory setting which use commercial kits for monitoring the minimal residual disease

    Credit Card Fraud Detection Using Hidden Markov Model

    No full text
    Abstract — Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As Credit card becomes the most popular mode of payment for both online as well as regular purchase cases of fraud associated with it are also raising. In this paper, we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can be used for the detection of frauds. If an Incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is considered to be fraudulent. At the same time, we try to ensure that genuine transactions are not rejected. Index Terms — Hidden Markov Model, credit card, fraud detection, online shopping, e-commerce (HMM). 2.1 Neural Networks

    A robust HIV-1 viral load detection assay optimized for Indian sub type C specific strains and resource limiting setting

    Get PDF
    BACKGROUND: Human Immunodeficiency Virus Type 1 (HIV-1) viral load testing at regular intervals is an integral component of disease management in Acquired Immunodeficiency Syndrome (AIDS) patients. The need in countries like India is therefore an assay that is not only economical but efficient and highly specific for HIV-1 sub type C virus. This study reports a SYBR Green-based HIV-1 real time PCR assay for viral load testing and is designed for enhanced specificity towards HIV-1 sub type C viruses prevalent in India. RESULTS: Linear regression of the observed and reference concentration of standards used in this study generated a correlation coefficient of 0.998 (p 0.5 log value, a figure that is considered clinically significant by physicians. CONCLUSION: The HIV-1 viral load assay reported in this study was found to be robust, reliable, economical and effective in resource limited settings such as those existing in India. PCR probes specially designed from HIV-1 Subtype C-specific nucleotide sequences originating from India imparted specificity towards such isolates and demonstrated superior results when compared to two similar commercial assays widely used in India
    corecore