1,972 research outputs found

    Aggressive Fibromatosis in Neck.

    Get PDF
    Aggressive fibromatosis (AF) is a locally aggressive infiltrative low-grade benign tumor that accounts for approximately less than 3% of all soft tissue tumors. In the head and neck region this tumor tends to be more aggressive and associated with significant morbidity. Aggressive surgery is a viable management option and may be successfully used as a single modality treatment, or in combination with radiotherapy. We report a rare case of AF in a 38 year old female, who presented with a painless mass over the left supraclavicular fossa, extending inferiorly into the thoracic inlet, which was excised successfully in toto with the help of cardiothoracic vascular surgeon (CTVS)

    Do Tender Offers Create Value? New Methods and Evidence

    Get PDF
    We develop the Probability Scaling Method, which rescales short-window announcement period returns; and the Intervention Method, which uses returns associated with intervening events, to estimate value improvements from tender offers. These methods address biases in conventional techniques, which measure only a fraction of the total tender offer gain; and which include revelation about bidder stand-alone value. Perceived value improvements are much larger than traditional methods indicate, so that we cannot reject the hypothesis that bidders on average pay fair prices for targets. Furthermore, our new methods affect inferences about economic forces in the takeover market. We identify several effects (higher combined bidder-target stock returns for hostile offers, lower for equity offers, and lower for diversifying offers) that reflect differences in revelation about stand-alone value, not gains from combination.Tender offers, value improvements, truncation dilemma, revelation bias, agency

    Green's Matrix for a Second Order Self-Adjoint Matrix Differential Operator

    Get PDF
    A systematic construction of the Green's matrix for a second order, self-adjoint matrix differential operator from the linearly independent solutions of the corresponding homogeneous differential equation set is carried out. We follow the general approach of extracting the Green's matrix from the Green's matrix of the corresponding first order system. This construction is required in the cases where the differential equation set cannot be turned to an algebraic equation set via transform techniques.Comment: 19 page

    Weyl type f(Q,T)f(Q,T) gravity observational constrained cosmological model

    Full text link
    In this paper, we have studied the dynamical aspects of the cosmological model of the Universe in the Weyl type f(Q,T)f(Q,T) gravity, which is an extension of symmetric teleparallel gravity. The non-metricity scalar QQ has been expressed in standard Weyl form and can be determined by a vector field wμw_{\mu} and the trace of energy momentum tensor denoted as TT. The logarithmic form of the Hubble parametrization has been incorporated and the best fit values of the free parameters have been determined using 32 CC32~CC sample points, 1701 Pantheon+1701~Pantheon^{+} and 6 BAO6~BAO data points. The present value of the H0≈70.2±4.6H_{0}\approx 70.2\pm 4.6, H0≈68.69−0.59+0.67H_{0}\approx 68.69_{-0.59}^{+0.67} and H0≈69.26−0.53+0.57H_{0}\approx 69.26_{-0.53}^{+0.57} respectively for CC SampleCC~Sample, CC+Pantheon+CC + Pantheon^{+} and CC+Pantheon++BAOCC + Pantheon^{+} + BAO datasets. With the constrained values of the free parameters, the cosmographic parameters are constrained and the present value of each parameter has been noted. The deceleration parameter for CC SampleCC~Sample, CC+Pantheon+CC + Pantheon^{+} and CC+Pantheon++BAOCC + Pantheon^{+} + BAO datasets provides −0.5221-0.5221, −0.5477-0.5477 and −0.5691-0.5691 respectively at present time. We have considered exponential and non-linear form of the Weyl type function f(Q,T)f(Q,T) to assess the dynamical behaviour of the model. The accelerating cosmological models show the quintessence behaviour at present time as we get the present EoS parameter values obtained as ω≈−0.7068\omega\approx -0.7068 and ω≈−0.6828\omega\approx -0.6828 for CC SampleCC~Sample, ω≈−0.6991\omega\approx -0.6991 and −0.6949-0.6949 for CC+Pantheon+CC + Pantheon^{+} and ω≈−0.7001\omega\approx -0.7001 and −0.7084-0.7084 for CC+Pantheon++BAOCC + Pantheon^{+} + BAO respectively.Comment: 14 pages, 11 Figures. Accepted version: Physics of the Dark Univers

    Hybrid Wireless Network Approach for QoS

    Get PDF
    Fast improvement of wireless networks has stimulated variety of wireless applications that have been used in number of areas such as commerce, emergency services, military, education, and entertainment. As wireless communication capture popularity, specific research has been devoted to supporting real-time transmission with Quality of Service (QoS) requirements for wireless network applications. At the same time, a wireless hybrid network that combines a mobile wireless ad hoc network (MANET) and a wireless infrastructure network has been considered to be a better option for the next generation wireless networks. By directly implementing resource reservation-based QoS routing for MANETs, hybrids networks inherit invalid reservation and race condition problems in MANETs

    Personalize News Recommendation System by Using Stack Auto Encoder

    Get PDF
    The popularity of Internet and mobile Internet, people are facing serious information overloading problems now a days. Recommendation engine is very useful to help people to reach the Internet news they want through the network. Recommender Systems have become the vital role in recent years and are utilized widely in various areas of social importance. In day to day life, users will not be able to read news every day due to heavy schedule. So to increase General knowledge of users we propose online recommendation systems which recommend news. In existing system i.e. news delivery portals deliver popular news on home page of the portal but user’s data according recommendation is not implemented yet. To overcome existing system problems we propose new recommendation system which automatically finds the news based on user’s profiles. Using the stack auto encoder algorithm

    Dry Magnetic Separation of Bauxite Ore

    Get PDF
    The paper describes the beneficiation results of the bauxite ore from Durgamanwadi mines to achieve a grade of the products conforming to refractory specification. Mineralogically, the bauxite was predominantly gibbsitic in nature with titanium and iron bearing minerals as main impurities which were intimately and intricately associ-ated with gibbistie. The sample was crushed to —2 mm and classified into 4 size fractions. Each were subjected to the dry magnetic separation using 'Permrol' supplied by the Ore Sorter, USA. The study indicated that the best separation result could be achieved at the optimum belt speed of 3 rpm on the —690+350 micron size fraction in respect of cleanliness of the product when compared to other two size fractions. Fe203 and TiO2 contents could be reduced to 1.52 % and 5.16 % in the concentrate from their respective values of 3.31 % and 7.31% in the feed

    Privacy Preserving For Secure Cloud Storage

    Get PDF
    Cloud Computing is one of the large and essential environment now a days to work for the storage collection and privacy preserve to that data. Cloud data security is most important and major concern for the client while use of the cloud services provided by the different service providers. There can be some major security concern and conflicts between the client and the service provider. To get out from those issues, a third party auditor uses as an auditor for assurance of data in the environment. Storage systems for the cloud has many fundamental challenges still today. All basic as well critical challenges among which storage space and security is generally the top concern in the cloud environment. To give the appropriate security issues we have proposed third party authentication system. The cloud not only for the simplified data storage but also secure data acquisition in cloud environment .At last we have perform different security analysis as well performance analysis. It give the results that proposed scheme has significant increases in efficiency for maintaining highly secure data storage and acquisition. The proposed method also helps to minimize the cost in environment and also increases communication efficiency in the cloud environment

    Implementation of Data Hiding Approach by Diverse Image Media

    Get PDF
    The network provides a method of communication to distribute information to the masses. With the growth of data communication over computer network, the security of information has become a major issue. Steganography and cryptography are two different data hiding techniques. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. In this paper propose a high capacity data approach by the combination of Steganography and cryptography. In the process a message is first encrypted using transposition cipher method and then the encrypted message is embedded inside an image using Higher LSB insertion method. The combination of these two methods will enhance the security of the data embedded. This combinational methodology will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel. In this paper computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR)

    LNA for UWB transceiver using 0.18µm CMOS Technology

    Get PDF
    An Ultra WideBand CMOS Low Noise Amplifier (LNA) is presented. Due to really low power consumption and extremely high data rates the UWB standard is bound to be popular in the consumer market. The LNA is the outer most part of an UWB transceiver. The LNA is responsible for providing enough gain to the signal with the least distortion possible. CMOS 0.18µm TSMC technology has been chosen for the design of the LNA at the transistor level. As many as five on chip inductors are implemented for the proper gain shaping over the frequency range of 3.1GHz to 10.6GHz. A noise figure of 3.98 dB is achieved to make sure noise contribution of the amplifier is as low as possible
    • …
    corecore