scholarly journals Evidence for Influenza and RSV interaction from 10 years of enhanced surveillance in Nha Trang, Vietnam, a modelling study.

Author(s):  
Naomi R Waterlow ◽  
Michiko Toizumi ◽  
Edwin van Leeuwen ◽  
Hien-Anh Thi Nguyen ◽  
Lay Myint-Yoshida ◽  
...  

Influenza and Respiratory Syncytial Virus (RSV) interact within their host posing the concern for heterologous ecological changes following vaccination. We aimed to estimate the population level impact of their interaction. We developed a dynamic age-stratified two-pathogen mathematical model that includes pathogen interaction through competition for infection and enhanced severity of dual infections. We used parallel tempering to fit it's parameters to 11 years of enhanced hospital-based surveillance for acute respiratory illnesses (ARI) in children under 5 years old in Nha Trang, Vietnam. The data supported either a 41% (95%CrI: 36 - 54) reduction in heterologous acquisition during infection and for 10.0 days (95%CrI 7.1 -12.8) thereafter, or no cross protection. We estimate that co-infection increased the probability for an infection in <2y old children to be reported 7.2 fold (95%CrI 5.0 - 11.4); or 16.6 fold (95%CrI 14.5 - 18.4) in the respective scenarios. Absence of either pathogen was not to the detriment of the other. We find stronger evidence for severity enhancing than for acquisition limiting interaction. In this setting vaccination against either pathogen is unlikely to have a major detrimental effect on the burden of disease caused by the other.

Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2014 ◽  
Vol 541-542 ◽  
pp. 658-662
Author(s):  
Jian Li ◽  
Yuan Chen ◽  
Yang Chun Yu ◽  
Zhu Xin Tian ◽  
Yu Huang

To study the velocity and pressure distribution of the oil film in a heavy hydrostatic thrust bearing, a mathematical model of the velocity is proposed and the finite volume method (FVM) has been used to simulate the flow field under different working conditions. Some pressure experiments were carried out and the results verified the correctness of the simulation. It is concluded that the pressure distribution varies small under different rotation speed when the surface load on the workbench is constant. But the velocity of the oil film is influenced greatly by the rotation speed. When the rotation speed of the workbench is as quick as enough, the velocity of the oil film on one radial side of the pad will be zero, that is to say the lubrication oil will be drained from the other three sides of the recess.


1984 ◽  
Vol 24 (06) ◽  
pp. 606-616 ◽  
Author(s):  
Charles P. Thomas ◽  
Paul D. Fleming ◽  
William K. Winter

Abstract A mathematical model describing one-dimensional (1D), isothermal flow of a ternary, two-phase surfactant system in isotropic porous media is presented along with numerical solutions of special cases. These solutions exhibit oil recovery profiles similar to those observed in laboratory tests of oil displacement by surfactant systems in cores. The model includes the effects of surfactant transfer between aqueous and hydrocarbon phases and both reversible and irreversible surfactant adsorption by the porous medium. The effects of capillary pressure and diffusion are ignored, however. The model is based on relative permeability concepts and employs a family of relative permeability curves that incorporate the effects of surfactant concentration on interfacial tension (IFT), the viscosity of the phases, and the volumetric flow rate. A numerical procedure was developed that results in two finite difference equations that are accurate to second order in the timestep size and first order in the spacestep size and allows explicit calculation of phase saturations and surfactant concentrations as a function of space and time variables. Numerical dispersion (truncation error) present in the two equations tends to mimic the neglected present in the two equations tends to mimic the neglected effects of capillary pressure and diffusion. The effective diffusion constants associated with this effect are proportional to the spacestep size. proportional to the spacestep size. Introduction In a previous paper we presented a system of differential equations that can be used to model oil recovery by chemical flooding. The general system allows for an arbitrary number of components as well as an arbitrary number of phases in an isothermal system. For a binary, two-phase system, the equations reduced to those of the Buckley-Leverett theory under the usual assumptions of incompressibility and each phase containing only a single component, as well as in the more general case where both phases have significant concentrations of both components, but the phases are incompressible and the concentration in one phase is a very weak function of the pressure of the other phase at a given temperature. pressure of the other phase at a given temperature. For a ternary, two-phase system a set of three differential equations was obtained. These equations are applicable to chemical flooding with surfactant, polymer, etc. In this paper, we present a numerical solution to these equations paper, we present a numerical solution to these equations for I D flow in the absence of gravity. Our purpose is to develop a model that includes the physical phenomena influencing oil displacement by surfactant systems and bridges the gap between laboratory displacement tests and reservoir simulation. It also should be of value in defining experiments to elucidate the mechanisms involved in oil displacement by surfactant systems and ultimately reduce the number of experiments necessary to optimize a given surfactant system.


Complexity ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-13
Author(s):  
M. V. Barbarossa ◽  
M. Polner ◽  
G. Röst

We investigate the temporal evolution of the distribution of immunities in a population, which is determined by various epidemiological, immunological, and demographical phenomena: after a disease outbreak, recovered individuals constitute a large immune population; however, their immunity is waning in the long term and they may become susceptible again. Meanwhile, their immunity can be boosted by repeated exposure to the pathogen, which is linked to the density of infected individuals present in the population. This prolongs the length of their immunity. We consider a mathematical model formulated as a coupled system of ordinary and partial differential equations that connects all these processes and systematically compare a number of boosting assumptions proposed in the literature, showing that different boosting mechanisms lead to very different stationary distributions of the immunity at the endemic steady state. In the situation of periodic disease outbreaks, the waveforms of immunity distributions are studied and visualized. Our results show that there is a possibility to infer the boosting mechanism from the population level immune dynamics.


2021 ◽  
Author(s):  
Pranesh Padmanabhan ◽  
Rajat Desikan ◽  
Narendra M Dixit

Although severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) vaccines work predominantly by eliciting neutralizing antibodies (NAbs), how the protection they confer depends on the NAb response to vaccination is unclear. Here, we collated and analysed in vitro dose-response curves of >70 NAbs and constructed a landscape defining the spectrum of neutralization efficiencies of NAbs elicited. We mimicked responses of individuals by sampling NAb subsets of known sizes from the landscape and found that they recapitulated responses of convalescent patients. Combining individual responses with a mathematical model of within-host SARS-CoV-2 infection post-vaccination, we predicted how the population-level protection conferred would increase with the NAb response to vaccination. Our predictions captured the outcomes of vaccination trials. Our formalism may help optimize vaccination protocols, given limited vaccine availability.


2021 ◽  
Author(s):  
Ahmad B. Hassanat ◽  
Ghada A. Altarawneh ◽  
Ahmad S. Tarawneh

Abstract The classic win-win has a key flaw in that it cannot offer the parties with right amounts of winning because each party believes they are winners. In reality, one party may win more than the other. This strategy is not limited to a single product or negotiation; it may be applied to a variety of situations in life. We present a novel way to measure the win-win situation in this paper. The proposed method employs the Fuzzy logic to create a mathematical model that aids negotiators in quantifying their winning percentages. The model is put to the test on real-life negotiation scenarios such as the Iranian uranium enrichment negotiations, the Iraqi-Jordanian oil deal, and the iron ore negotiation (2005-2009). The presented model has shown to be a useful tool in practice and can be easily generalized to be utilized in other domains as well.


2017 ◽  
Vol 6 (2) ◽  
Author(s):  
Michael Chia ◽  
Ahmad Munir Che Muhamed ◽  
LOW Li Choo Pamela Suraddah ◽  
Nur Adilah Masismadi

Prolonged sitting has a detrimental effect on lipid metabolism and insulin sensitivity leading to increased risks of metabolic conditions. Attendees at conferences typically sit for long periods during oral presentations. The use of visual cues or ‘just-in-time’ prompts during oral presentations can inform audiences about the deleterious effects of prolonged sitting and encourage them to avoid sitting for long periods. It remains largely unclear whether these ‘just-prompts used in a conference setting are effective in reducing prolonged sitting. The ‘just-in-time’ prompts were used in two separate conference audiences- one focused on health and the other on language. Ten sessions were randomly assigned to the experimental group (EXPT, with the JIT prompt) and ten sessions to the control group (CON, without the JIT prompt). In both conferences, the proportion of the attendees who chose not to sit during the oral presentations in the EXPT conditions was less than 10%. The main finding was that the use of the JIT prompt to discourage sitting at the health conference where attendees were likely to be knowledgeable about the dangers of prolonged sitting was ineffective (EXPT vs CON conditions, p>0.05; ES=0.69) compared to conference attendees at a language conference (EXPT vs CON conditions, p<0.05, ES=1.14).


2010 ◽  
Vol 1 (3) ◽  
pp. 151
Author(s):  
Herawati Herawati ◽  
Jenny Sunariani

Tobacco contains thousands of chemical substances which known to be harmful to periodontal tissues. Nicotine was considered as the most toxic substances to periodontal tissues. The datas in this review indicate that smoking may have a significant role in the initiation and progression of periodontal destruction. The conclusion of this and the other studies indicate that smokers have a less favorable response to periodontal therapy than non smoker. Nicotine is potentially toxic substances that have a detrimental effect on periodontal tissue, by altering the host response or directly damage the cells of normal periodontium.


Author(s):  
Ελένη Κυργερίδου ◽  
Παναγιώτα Βόρρια ◽  
Γρηγόρης Κιοσέογλου

The current study examined the association between attachment style and adjustment in romantic relationships as well as the association between perceptions of adult attachment and adjustment in romantic relationships. 65 cohabitating couples aged from 21 to 32 years were recruited for the study. Couples completed the following self-report questionnaires: 1) Perceptions of Adult Attachment Questionnaire, PAAQ, Lichtenstein & Cassidy, 1991, 2) Experiences in Close Relationships Inventory, ECR, Brennan, Clark & Shaver, 1998 and 3) Dyadic Adjustment Scale, DAS, Spanier, 1976. Results showed that secure couples (both partners described themselves as securely attached) as well as mixed couples (one partner chose the secure description and the other defined himself or herself as insecure) reported higher relationship quality compared to both insecure couples (both partners described themselves as insecurely attached). Analyses aimed to test the links between early attachment experiences and marital relationship quality illustrated that both partners’ rejection from their mother in early childhood had a detrimental effect on women’s marital adjustment.


Sign in / Sign up

Export Citation Format

Share Document