441 research outputs found

    PUBLISHING SEARCH LOGS PRIVACY GUARANTEE FOR USER SENSITIVE INFORMATION

    Get PDF
    Search Engine companies maintain the search log to store the histories of their users search queries. These search logs are gold mines for researchers. However, Search engine companies take care of publishing search log in order to provide privacy for user’s sensitive information. In this paper we analyze algorithm for publishing frequent keywords, Queries, and Clicks of a search log. Before Zealous algorithm, we discuss how different variants of anonymity failed to provide good utility (publishing frequent items) and strong privacy for the search logs. And also this paper includes how zealous algorithm provides good utility and strong privacy for publishing search logs

    Trachea and the mode of branching of bronchial tree

    Get PDF
    INTRODUCTION: The trachea provides a passageway for inhaled gas to reach the gasexchange regions of the lungs from the atmosphere. Its characteristic anatomy provides the surgeon with many challenges. Knowledge of anatomy is essential to the study of airway management. The rigidity of trachea is provided by cartilaginous rings that extend approximately two-thirds the circumference. Both benign and malignant processes affect trachea necessitating treatment. The initial evaluation of patients with suspected tracheal pathology includes a thorough history and physical examination, standard chest x-ray and neck x-ray, CT scan can determine local extension, degree of luminal compromise and the length of the trachea that is involved. Bronchoscopy is required in the evaluation and treatment of tracheal pathology. Tracheostomy should be considered in the presence of severe maxillofacial injury to ensure an adequate airway. The golden rule of tracheostomy based entirely on anatomical considerations- “is stick exactly in the midline”. In the present work, the effort will be to provide an account of the structure of the lungs, with particular attention to its application in thoracic surgery. More and more, rational dissection has come to replace the unnecessarily destructive method of mass ligature at the hilum. The availability of effective chemotherapy, especially for tuberculosis, has made the benefits of segmental resection available to an ever increasing number of patients. Peripheral lesions can be removed by “wedge” resection, but there has renamed a definite need for more direct attack on lesions confined to a single segment deep within a lobe, where conservation of tissue is of paramount importance. Here an account of knowledge of bronchial and vascular relationships is essential, if these operations are to be done with maximum safety. AIM OF THE STUDY: 1. To study the anatomical variations in length, diameter and number of tracheal rings. 2. To study the anatomical variations in length, angle and the divisions of primary bronchus. 3. To study the anatomical variations of bronchial tree in right and left lungs. MATERIALS AND METHODS: The 50 pairs of specimens for this present study were obtained from the embalmed cadavers of Anatomy Department and also from the postmortemed bodies in the Department of Forensic Medicine, Thanjavur Medical College during the period of study. The specimens were collected without any age, sex, socio-economic status, religion or pathological bias. The specimen was removed from the cadaver as per the Cunningham’s manual of practical anatomy. An incision is made in the skin from chin to sternum in the midline and the flap of skin is reflected inferolaterally. A transverse incision is made through the deep fascia immediately above the sternum and the deep fascia is reflected. The infrahyoid muscles are separated to expose the pretracheal fascia. Below the isthmus of the thyroid gland trachea is exposed after removing the pretracheal fascia. A transverse cut is made below the cricoid cartilage and the trachea is separated from the adjacent structures. CONCLUSION: In the present study the tracheo bronchial tree was studied and the results were compared with earlier studies. The summary of the present study in human, in 50 pairs of specimens of both lungs is as follows. The diameter of trachea was within normal limits in about 94%. The length of trachea was within normal limits in about 76%. The number of tracheal rings was within normal limits in about 90%. The length of the right primary bronchus was within normal limits in about 90%. The angle of the right primary bronchus was within normal limits in about 90%. The length of the left primary bronchus was within normal limits in about 94%. The angle of the left primary bronchus was within normal limits in about 72%. In the right lung both eparterial and hyparterial bronchus were present. In the left lung only the hyparterial bronchus was present in all specimens. In the right upper lobe bifurcation occurred in 66%, trifurcation in 34%. In the right middle lobe length of the middle lobe bronchus was within normal limits in 86%. In the right middle lobe bifurcation occurred in 94%, trifurcation in 6%. In the right lower lobe superior segment orifice was at same level or overlapping in 30% and at separate levels in 70%. In the right lower lobe the branching pattern of superior segment was bifurcation in 90% and trifurcation in 10%. In the right lower lobe the subsuperior bronchus was present in 92%. In the right lower lobe the branching pattern of basal trunk was bifurcation in 84% and trifurcation in 16% of the specimens. In the left upper lobe branching pattern was bifurcation in 88%, trifurcation in 12%. In the left lower lobe superior segment bronchus bifurcated in 90%, trifurcated in 10%. In the left lower lobe subsuperior bronchus was present in all lungs. In the left lower lobe the branching pattern of basal trunk was bifurcation in 78%, trifurcation in 22%. Unfortunately the lung is not simply built. An understanding of its structure can be achieved only by effort. In planning operative procedures that will serve to remove disease, while preserving useful tissue, this effort will be well expended. An attempt at application of the anatomical data is very useful to the planning of the surgical approach. Pulmonary functions show exactly how essential is the amount of pulmonary tissue for good and efficient functioning of lungs. Therefore the segmental resection can be performed in eligible cases saving valuable lung tissue. To undertake this, detailed anatomy of the segmentation of lungs then becomes inevitable. This study is presented to shed more light on normal anatomy of trachea and the branching pattern of bronchi

    GAECH: Genetic Algorithm Based Energy Efficient Clustering Hierarchy in Wireless Sensor Networks

    Get PDF
    Clustering the Wireless Sensor Networks (WSNs) is the major issue which determines the lifetime of the network. The parameters chosen for clustering should be appropriate to form the clusters according to the need of the applications. Some of the well-known clustering techniques in WSN are designed only to reduce overall energy consumption in the network and increase the network lifetime. These algorithms achieve increased lifetime, but at the cost of overloading individual sensor nodes. Load balancing among the nodes in the network is also equally important in achieving increased lifetime. First Node Die (FND), Half Node Die (HND), and Last Node Die (LND) are the different metrics for analysing lifetime of the network. In this paper, a new clustering algorithm, Genetic Algorithm based Energy efficient Clustering Hierarchy (GAECH) algorithm, is proposed to increase FND, HND, and LND with a novel fitness function. The fitness function in GAECH forms well-balanced clusters considering the core parameters of a cluster, which again increases both the stability period and lifetime of the network. The experimental results also clearly indicate better performance of GAECH over other algorithms in all the necessary aspects

    Are Antipyretic Medications Compatible with SARS-CoV-2 Vaccines?

    Get PDF

    What About Anosmia From COVID-19 ?

    Get PDF

    3-WAY Secured WSN with CSDSM-DNN based Intrusion Detection Model

    Get PDF
    In Wireless Sensor Networks (WSNs), intrusion aims indegrading or even eliminating the capacity of these networks for providing their functions. Thus, in recent years, several ideas are brought and employed. However, these techniques still did not fulfill their requirements in attaining better classification accuracy. This paper proposes a novel Cosine Similarity Distance integrated Sammon Mapping learning layer-Deep Neural Network (CSDSM-DNN)-centricIntrusion Detection Model (IDM) in WSNfor attaining better outcomes. Initially, the nodes are clustered; after that, utilizing Binomial Distribution based Dwarf Mongoose Optimization (BD-DMO), the cluster heads are selected. Then, theIdentity Matrix Function-Kalman Filter (IMF-KF) identified the optimal route. Subsequently, the data is transferred via the secured route. The transferred data is pre-processed and then, the important features are selected. Lastly, to classify whether the data is attacked or non-attacked, the selected features are given into the CSDSM-DNN. Therefore, with the prevailing approaches, the experiential outcomes are evaluated and analogized and it exhibits the proposed model’s higher reliability and efficacy

    DNA Computing Using Cryptographic and Steganographic Strategies

    Get PDF
    Information protection and secrecy are major concerns, especially regarding the internet’s rapid growth and widespread usage. Unauthorized database access is becoming more common and is being combated using a variety of encrypted communication methods, such as encryption and data hiding. DNA cryptography and steganography are used as carriers by utilizing the bio-molecular computing properties that have become more common in recent years. This study examines recently published DNA steganography algorithms, which use DNA to encrypt confidential data transmitted through an insecure communication channel. Several DNA-based steganography strategies will be addressed, with a focus on the algorithm’s advantages and drawbacks. Probability cracking, blindness, double layer of security, and other considerations are used to compare steganography algorithms. This research would help and create more effective and accurate DNA steganography strategies in the future

    FORMULATION AND EVALUATION OF EXTENDED RELEASE PELLETS OF PIOGLITAZONE HYDROCHLORIDE USING NATURAL AND SYNTHETIC POLYMERS BY FLUIDIZED BED COATING TECHNIQUE

    Get PDF
    Objective: The objective of the current work was to develop Pioglitazone hydrochloride (HCl) pellets coated with natural polymer extracted from peas gum and also to compare the drug release profile with coatings containing semi-synthetic and synthetic polymers. Methods: Fluidized bed coating technique was used to develop pellets. A 22 factorial design was employed to study the effect of independent variables (inlet air temperature and spray rate), on dependent variables (percentage entrapment efficiency, percentage friability, and average particle size). Optimization was done by fitting experimental data to the software program. Obtained pellets were subjected to different evaluation parameters which are critical in the development of the dosage form. An in vitro lag phase study was carried out for all batches in simulated gastric fluid (0.1N HCl) for 5 h and in vitro drug release study was carried out for optimized batch (E-2 and P-3) in simulated intestinal fluid (pH 7.4 phosphate buffer). Results: The optimized batches E-2 and P-3 showed satisfactory percentage entrapment efficiency of 92.66±1.52, percentage friability of 0.57±0.03, and average particle size of 1424±16 μm. All batches maintained lag phase for 5 h in 0.1N HCl. An optimized batch of two different sizes exhibited a burst release within 30 min in a simulated intestinal fluid with no significant difference in release rate constant (*p>0.05) and followed first-order kinetics. Conclusion: Thus, Pioglitazone HCl pulsatile pellets were successfully developed for treating diabetes mellitus by fluidized bed coating technique employing factorial design

    Formulation of Sodium Alginate Nanospheres Containing Amphotericin B for the Treatment of Systemic Candidiasis

    Get PDF
    Purpose: The aim of this work was to formulate sodium alginate nanospheres of amphotericin B by controlled gellification method and to evaluate the role of the nanospheres as a “passive carrier” in targeted antifungal therapy. Methods: Sodium alginate nanospheres of amphotericin B were prepared by controlled gellification method, and the particle size analysis was carried out by scanning electron microscopy. The carrier capacity of sodium alginate was evaluated in terms of drug to polymer ratio. In vitro release study was carried out on all drug loaded nanospheres by the dialysis method. Release kinetics of drug from different drug loaded nanospheres was also determined. The in vivo antifungal efficacy of nanospheres bound drug vis-à-vis the free drug was evaluated in candidiasis- induced mice models. Results: Preparation of nanospheres through controlled gellification method yielded particles with a size range of 419.6 ± 0.28 nm. Studies on drug to polymer ratio showed a linear relationship between concentration of drug and drug loading capacity. In vitro release kinetic study revealed that the release of drug from the nanospheres followed Fickian diffusion. In vivo studies showed that the nanosphere-bound drug produced a higher antifungal efficacy than the free drug. Conclusion: The formulated sodium alginate nanospheres containing amphotericin B was found to have better antifungal activity when compared to the free drug and also yielded sustained in vitro release. Keywords: Nanospheres, sodium alginate, amphotericin B, controlled gellification method, in vitro & in vivo release > Tropical Journal of Pharmaceutical Research Vol. 6 (1) 2007: pp. 653-65
    • …
    corecore