545 research outputs found

    Matching Preclusion of the Generalized Petersen Graph

    Get PDF
    The matching preclusion number of a graph with an even number of vertices is the minimum number of edges whose deletion results in a graph with no perfect matchings. In this paper we determine the matching preclusion number for the generalized Petersen graph P(n,k)P(n,k) and classify the optimal sets

    Analysis of Recommended Weight Limit to Mitigate the Lower Back Pain in Manual Material Handling Task

    Get PDF
    In this paper Authors have tried to calculate the revised Recommended Weight Limit (RWL) on the basis of revised Load constant (LC), Horizontal Multiplier (HM), Vertical Multiplier (VM) which are calculated according to the collected data from industry. While their average value had been considered in National institute for occupational safety &health (NIOSH) lifting equation. Thought behind this was that person’s age, obesity and height can not be taken constant Authors have applied the new approaches for setting limits of LC, HM, VM for optimizing the value of RWL of workers who work in industry. The approach may probably lead to calculate the safe weight for lifting and lowering in manual material handling task. It is expected that such an approach may be more protective for workers in manual material handling

    Evaluation of Acceptable Weight of Bag For Students in School: A Fuzzy Logic Approach

    Get PDF
    Overweight schools bags will bring additional stress and fatigue to primary and junior secondary students. The Department of Health recommends that, as a precautionary measure, students should avoid carrying school bags which exceed 15% of their body weight for long periods of time. Around 60 per cent of Indian schoolchildren may suffer back pain by carrying schoolbags. For example, a heavy bag that’s slung over one shoulder can, over the 12 years of schooling, cause chronic back problems that linger into adulthood. Risks include muscle strain, distortion of the natural ‘S’ curve of the spine and rounding of the shoulders. The low back pain as a result of carrying of school bag by students has necessitated the attention given to the determination of limits of weight of school bag carrying by students in the school. It was however noted by that no Occupational Safety and Health organization exist regarding what constitutes the maximum acceptable or safe weight of school bag. After this observation, several researchers have worked on the subject of weight of school bag using three main approaches namely: Physiological, Psychophysical and Biomechanical. Author has applied the Fuzzy logic approaches for setting weight limit (WL) of school bag to be carried by students in school in the analysis the strengths and the weaknesses with the height are taken in to consideration. The approach may probably lead to reduce the problem of low back pain of students caused by heavy weight of school bag

    Uterine vascular lesions: a rare cause of abnormal uterine bleeding, reporting of two cases

    Get PDF
    Uterine vascular lesions in the form of arteriovenous malformation or pseudo aneurysm are rare but potential life-threatening source of bleeding. A high index of suspicion and accurate diagnosis of the condition in a timely manner are essential because instrumentation that is often used for other causes of uterine bleeding can lead to massive hemorrhage. We describe two cases of uterine vascular malformation, one presenting as postabortal hemorrhage and other as postpartum hemorrhage. Case one presented as postabortal hemorrhage after induced abortion following dilatation & curettage. Case two presented as delayed postpartum hemorrhage after six weeks following cesarean section. In both cases diagnosis of uterine arteriovenous malformation was made on Doppler ultrasonography which was subsequently confirmed on pelvic angiography. The embolization of affected uterine arteries was performed successfully in both cases. Uterine vascular lesion should be suspected in patient with abnormal vaginal bleeding, especially who has recent medical history of induced abortion or dilatation and curettage or cesarean section and so on. Although angiography remains the gold standard for making diagnosis, Doppler ultrasonography is also a good noninvasive technique for the same. Uterine artery embolization offers a safe and effective treatment

    Enhancing Syndromic Surveillance through Autonomic Health Grids

    Get PDF
    The Centers for Disease Control defines syndromic surveillance as, “an investigational approach where health department staff, assisted by automated data acquisition and generation of statistical alerts, monitor disease indicators in real-time or near real-time to detect outbreaks of disease earlier than would otherwise be possible with traditional public health methods” (CDC, 2004). While syndromic surveillance has traditionally been used in the context of detecting natural outbreaks, it is increasingly being used to develop systems to detect bioterrorism outbreaks. Timely response to a bioterrorism event requires accurate information exchange between clinicians and public health officials. This entails building highly complex surveillance systems that provide access to heterogeneous/distributed medical data, computational resources and collaborative services, for real-time decision making in a highly reliable and secure environment. In this paper we propose enhancing syndromic surveillance through grid and autonomic computing augmentations, and present our approach to a proof of concept modeling and simulation environment

    Literature Survey of Security Enhancement in MANET Routing Protocols of WLANs

    Full text link
    A Mobile Ad-hoc Network (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. One of the main issues in such networks is performance- in a dynamically changing topology; the nodes are expected to be power-aware due to the bandwidth constrained network. Another issue in such networks is security - since every node participates in the operation of the network equally, Malicious nodes are difficult to detect. There are several applications of mobile ad hoc networks such as disaster recovery operations, battle field communications, etc. The most active research area under MANET routing protocol is security. MANETs have certain unique characteristics that make them vulnerable to several types of attacks. Since they are deployed an open environment where all nodes co-operate in forwarding the packets in the network, Malicious nodes are difficult to detect

    Performance Analysis of Multiple Access Techniques for LTE system under Symbol Error Rate (SER) Calculation

    Full text link
    In the recent years, so many technologies in multiple access trends have influenced the field of Wireless Sensor Networks in significant ways. Various trends are readily available technology of ubiquitous wireless sensor networks as well as wireless communication networks and progress in the development of two multiple access techniques are compared in this scenario: the OFDMA and SC-FDMA. The OFDMA and SC-FDMA transceivers are modeled and simulated considering both the interleaved and localized subcarriers mapping schemes. WSNs have the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. To prolong the networklsquo;s hop in terms of single and two hop using both techniques should be used in the sensor nodes. The minimization of computing and storage platforms as well as the development of novel micro sensors and sensor materials with high reliability force encourages technology in research on WSN. In this paper, we will proposed the field of multipath routing in wireless sensor networks, and mainly focus on the technology of SER of WSNs

    Induced Size Effects Of Gd3+ ions Doping On Structural And Magnetic Properties Of Ni-Zn Ferrite Nanoparticles

    Get PDF
    Gd3+ ions substituted in Ni0.5Zn0.5GdxFe2-xO4 (where x = 0.1, 0.2, 0.3) ferrite nanoparticles in the size range from 15 to 25 nm were prepared by chemical method. The effect of Gd3+ ions in spinel structure in correlation to structural and magnetic properties have been studied in detail using XRD, HRTEM and EPR techniques. The spin resonance confirms the ferromagnetic behaviour of these nanoparticles and higher order of dipolar-dipolar interaction. On increasing Gd3+ ions concentrations, the super exchange interaction i.e. increase in movement of electron among Gd3+ - O - Fe3+ in the core group and the spin biasing in the glass layer has been interpreted. The decrease in ‘g’ value and increase in relaxation time is well correlated with the change of particle size on different concentrations of Gd3+ ions in Ni-Zn ferrite

    An Overview on Fast Disintegrating Sublingual Tablets

    Get PDF
    The demand of fast disintegrating tablets has been growing during the last decade, due to the characteristics of fast disintegrating sublingual tablets for the potential emergency treatment. In terms of permeability, the sublingual area of the oral cavity (i.e, the floor of the mouth) is more permeable than the buccal (cheek) area, which in turn is more permeable than the palatal (roof) of the mouth. Drug delivery through the oral mucous membrane is considered to be a promising alternative to the oral route. Fast disintegrating sublingual tablets may lead to significant improvements over current treatment options for specific patient group, for instance pediatric and geriatric patients. This review highlights the mechanism of sublingual absorption, factors affecting sublingual absorption, formulation techniques, types of sublingual tablets, advantages, evaluation parameters and commercially available sublingual dosage forms
    • 

    corecore