205 research outputs found

    Study of cervical cytology in pap smears in a tertiary care hospital of North Maharashtra

    Get PDF
    Background: Cervical cancer is the fourth leading cause of death in females worldwide. In India cervical cancer is the leading cause of morbidity and mortality. Cancer of cervix is preventable, and can be diagnosed at the pre-malignant stage with adequate and repetitive cytological screening by Papanicolaou (Pap) smears. Aim of this study was to study the role of Pap smear in detecting premalignant and malignant lesions as well as non-neoplastic lesions of cervix. Methods: It is a retrospective study of 240 pap smears studied from January 2022 to June 2022 and received in pathology department of a tertiary care hospital of north Maharashtra. Samples are collected from women between 21 to 65 years presenting with some gynecological problems. Smears were reported as per the 2014 Bethesda system. Results: Out of 240 women, 216 were having normal cytology and 146 cases with inflammatory changes. 10 cases were unsatisfactory. 5 cases of ASCUS, 1 case of SCC, 2 cases of HSIL and 6 cases of LSIL were observed. Conclusions: Pap smear test is a simple, safe, noninvasive, economical OPD based procedure to detect pervasive cervical epithelial lesions. Every woman should undergo Pap test at least once in her life before the age of 45 years

    Garbhsanskar Guru App: A Comprehensive Cross-Sectional Study on Pregnancy Outcomes and Maternal Well-being

    Get PDF
    This whitepaper provides an in-depth analysis of a cross-sectional study on the Garbhsanskar Guru app, focusing on its significant impact on pregnancy outcomes and maternal well-being. Involving 1,323 mothers who practiced Garbh Sanskar through the app, the study collected data through a postnatal survey, revealing positive influences on baby's birth weight, delivery timing, and maternal stress and positivity levels. The results demonstrate the app's effective role in enhancing pregnancy outcomes and maternal mental health

    Implementation of Fast, Low Power and Area Efficient Carry Select Adder

    Get PDF
    One of the fastest adders is Carry Select Adder (CSLA) and it perform fast arithmetic functions in many data processing processors. A conventional CSLA has less carry propagation delay (CPD) than ripple carry adder (RCA). A compromise between RCA and carry look ahead adder is provided by Carry select adder. For the CSLA new logic is proposed by reducing redundant logic operations present in conventional CSLA. In the proposed scheme, schedule the carry select (CS) operation before final sum calculation. which is different approach from the conventional. Two carry words ( cin = 0 and 1) bit patterns and fixed cin bits use for generation units and CS logic optimization. Optimized logic units is used to obtain an efficient CSLA design. The proposed work is carried out using Modelsim SE 6.3f and Quatus2 software. DOI: 10.17762/ijritcc2321-8169.16046

    Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. A cover image is fused with secret image; fused image is divided into n shares. k possible shares able to construct secret image. PSNR parameter are used for image quality The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database

    Recent Advances in Heat Transfer Augmentation by using Twisted Tapes: A Review

    Get PDF
    In the past decade several studies on the passive techniques of heat transfer augmentation have been reported. The present paper is a review on progress with the passive augmentation techniques in the recent past and will be useful to designers implementing passive augmentation techniques in heat exchanger. In passive technique twisted tape insert is playing an important method to enhance the heat transfer characteristics of a heat exchanger without affecting much the overall performance of the system. The present review is organized in two different sections: augmentation of heat transfer in laminar flow and augmentation of heat transfer in turbulent flow. Key words: Heat transfer augmentation, Passive methods, Twisted Tape inserts, Reynolds number, Friction facto

    A Review on an Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database

    EFFICACY OF AYURVEDIC THERAPIES ON PSORIASIS: A REVIEW ON RESEARCHES CONDUCTED AT GUJARAT AYURVED UNIVERSITY, JAMNAGAR

    Get PDF
    Psoriasis is a chronic disease that has substantial psychological and social impact on a patients life. However the treatment options available in contemporary system of medicine are not much satisfactory. Psoriasis is far more than just a skin disease and is equated to Eka Kushtha in Ayurveda. Various clinical studies have been carried out at different research centers in India on Psoriasis (Eka Kushtha). Present study is aimed to compile such available research works in various departments of two PG institutes under Gujarat Ayurved University. Total 27 completed research works on Psoriasis were found at PG (24) and PhD (3) levels, which revalidated the impact of various Ayurvedic treatment modalities (viz. Shodhana and Shamana). In Shamana therapy maximum drugs were of Vata Kapha Shamaka, Rakta Prasadana, Vishaghna, Kushthaghna and Kandughna etc. properties, which effectively counteract the etio-pathogenesis of Psoriasis. Whereas, in Shodhana therapy maximum times Virechana procedure was carried out. The therapies were found to be significantly effective and clinically safe as no adverse drug reactions were reported during treatment period

    An individually verifiable voting protocol with complete recorded-as-intended and counted-as-recorded guarantees

    Full text link
    Democratic principles demand that every voter should be able to individually verify that their vote is recorded as intended and counted as recorded, without having to trust any authorities. However, most end-to-end (E2E) verifiable voting protocols that provide universal verifiability and voter secrecy implicitly require to trust some authorities or auditors for the correctness guarantees that they provide. In this paper, we explore the notion of individual verifiability. We evaluate the existing E2E voting protocols and propose a new protocol that guarantees such verifiability without any trust requirements. Our construction depends on a novel vote commitment scheme to capture voter intent that allows voters to obtain a direct zero-knowledge proof of their vote being recorded as intended. We also ensure protection against spurious vote injection or deletion post eligibility verification, and polling-booth level community profiling

    Insight into the design and fabrication of a leaf-mimicking micropump

    Get PDF
    A micropump is the heart of any microfluidic device that finds applications in several lab-on-chip devices. Passive micropumps are highly desirable for this purpose due to their ease of integration, low energy requirements and simplistic design and operation. The design of a plant leaf serves as a natural inspiration for developing an evaporation assisted passive micropump. The presence of branching channel like venation pattern ensures water distribution to the spongy mesophyll cells increasing the surface area for evaporation. However, due to its multiscale design and complexity of the venation pattern, emulating a leaf's design is challenging. Apart from the lack of understanding of design parameters that affect fluid flow, manufacturing limitations impede the development of such bio-inspired micropumps. Inspired by the multi-scale design of the leaf, in this work we propose a passive micropump mimicking the structure of a leaf. Employing evaporation and capillary pressure as the pumping mechanism, our leaf mimicking micropump consists of a microporous membrane integrated with a branched, fractal channel network resembling a leaf's venation pattern. Our proposed fabrication methodology is simple, scalable, inexpensive and uses readily available materials. We demonstrate a significant increase in the fluid flow rate due to the addition of this branched channel network. We support our experimental observations using an analytical model, wherein we discuss the design parameters that affect the pumping rate. Correspondingly, the performance of these micropumps can be optimized based on intrinsic and extrinsic factors as per the desired applications
    • …
    corecore