55 research outputs found

    New Algorithm For Detection of Spinal Cord Tumor using OpenCV

    Get PDF
    The spinal cord one of the most sensitive and significant parts of the human body lies protected inside the spine the backbone and contains bundles of nerves Any minor problem in the spinal cord can cause debilitation of internal and external functions of the human body One of the complications in the spinal cord is tumor - abnormal growth of tissue In this project we present a new algorithm based on OpenCV to detect spinal cord tumors from MRI sagittal image without human intervention The new algorithm can detect tumor-like substances adjacent to the spinal cord Tests carried out on spinal cord MRI images 33 cervical spinal images showed approximately 90 91 of accuracy rate in detecting tumor

    An Assessment to Human Perception to the Origin of Coronavirus by the Impact of Climate Change and Preventative Management of Pandemic Coronavirus COVID-19

    Get PDF
    On 12 January 2020, the WHO confirmed that a novel coronavirus was the cause of a respiratory illness in a cluster of people in Wuhan City, China. The aims of the study to assess the human perception to the origin of Coronavirus with relation to nature and find out preventative management about coronavirus. Primary data was collected for analyzing some factors regarding the Coronavirus microorganism formed by the impact of climate change. Primary data was collected through an online questionnaire survey. An online questionnaire survey is used for human perception for taking public opinion about the origin of Coronavirus and preventative management which are conducted in Bangladesh. SPSS software is used for Linear Regression analysis and correlation with some variables. A total of three variables were considered in the model estimation of which are dependent variables Coronavirus microorganism formed by the impact of climate change and independent variables such as Coronavirus microorganism formed by the impact of environmental pollution, Coronavirus microorganism formed by the impact of global heat and Coronavirus microorganism originated by the sources of the impact of ice melting polar region. From the analysis, it is found that the Coronavirus microorganism formed by the impact of climate change that makes a unique and statistically significant contribution to the prediction. Among 200 respondents, about 70% of peoples said “Maybe” Coronavirus microorganism formed by the impact of climate change, and it’s some factor. It is also found from the correlation analysis that the epidemic effects of COVID-19 will high on Bangladesh, if immigrant persons come, if Curfew doesn’t issue, if peoples are not conscious, if peoples are not properly using mask and hand gloves, if they are not maintaining social distance and lock down rules. In the finding that, in the polar region, there are many ice stacks where thousands of years ago, the animals are dead but the virus and bacteria are in a state of sleep. As the heat increases, all glaciers and permafrost start to melt in the Polar region. As a result, many types of viruses, bacteria are starting to live. These viruses including Coronavirus will be mixed with different environmental elements such as water, biodiversity. This will easily affect biodiversity and other animals including humans. Above all Climate change may play a significant role in the transmission of many infectious diseases including Coronavirus. Community responses are important for outbreak management during the early phase of major preventive options

    Relation of radial artery occlusion after trans-radial percutaneous coronary intervention with the duration of hemostatic compression

    Get PDF
    Background: Trans-radial percutaneous coronary intervention (PCI) in cardiac procedures accesses coronary arteries through the wrist's radial artery. Post-PCI, hemostatic compression on the radial artery prevents bleeding and aids healing. Radial artery occlusion (RAO), a possible complication, involves blockage of the radial artery. This study aimed to assess the relationship between radial artery occlusion after trans-radial percutaneous coronary intervention with the duration of hemostatic compression. Methods: This prospective observational study was conducted in the Department of Cardiology, National Institute of Cardiovascular Diseases (NICVD), Dhaka, Bangladesh, spanning from September 2018 to August 2019. The study enrolled 140 patients who underwent percutaneous coronary intervention (PCI) through the trans-radial approach (TRA), randomly assigned to two groups: Group I (2-hour hemostatic compression after PCI) and Group II (6-hour hemostatic compression post-procedure). Data analysis was performed using SPSS version 23.0. Results: In this study, early radial artery occlusion was observed in 4.3% of patients in group I and 12.8% in group II (P=0.04), while late radial artery occlusion occurred in 2.8% of patients in group I and 11.4% in group II, with a statistically significant difference (P=0.04). Multivariate logistic regression analysis identified a 6-hour hemostatic compression duration (P=0.01), post-procedural nitroglycerine use (P=0.03), and procedure time (P=0.03) as predictors of radial artery occlusion. Conclusions: Reduced hemostatic compression duration is linked to a decreased occurrence of both early and late radial artery occlusion following trans-radial intervention

    Effects of soil amendment and nitrogen levels on growth, yield and nitrogen uptake by rice plant under saline condition in Noakhali District, Bangladesh

    Get PDF
    A field experiment was conducted to evaluate the effect of different soil amendments and nitrogen levels on growth, yield and N uptake by rice (cv. BINA dhan10) under saline soil condition. Treatments consisted of three FYM and gypsum combinations in main plot viz. M1: gypsum @ 210 kg/ha, M2: FYM 3 t/ha + gypsum 140 kg/ha and M3: FYM 6 t/ha. Three nitrogen treatments assigned in sub-plots viz. N1: 75 kg N/ha, N2: 100 kg N/ha and N3: 125 kg N/ha. The study revealed that the combination of FYM and gypsum with and N levels produced the maximum grain yield of rice (6.07 t/ha) under the treatment combinations of M1N3, i.e. gypsum @ 210 kg/ha along with 125 kg N/ha

    Response of yield, nitrogen use efficiency and grain protein content of wheat (Triticum aestivum L.) varieties to different nitrogen levels

    Get PDF
    A field experiment was carried out in order to investigate the response of nitrogen use efficiency and yield of two wheat varieties to different nitrogen levels. The wheat varieties, viz. Bijoy (V1) and Prodip (V2) were tested under 4 levels of nitrogen (N0 = 0 kg N/ha, N1 = 60 kg N/ha, N2 = 120 kg N/ha and N3 = 180 kg N/ha) where wheat varieties assigned in main plot and nitrogen treatments in subplot. Grain yield was increased with increasing rates of nitrogen. Maximum grain yield (3.85 kg/ha) produced by the variety Prodip when N applied @ 180 kg/ha and minimum (1.15 kg/ha) by the variety Bijoy under control treatments. Interactions of two variety and nitrogen levels; N uptake by grain and straw increased with increasing nitrogen levels. Highest N uptake by grain (90.60 kg/ha) and straw (25.53 kg/ha) were observed from the variety Prodip with 180 kg N/ha. Highest (38.66) N use efficiency (NUE) was noticed in Prodip when received 60 kg N/ha. Grain protein (%) also showed maximum value (14.29) when Prodip fertilized with 180 kg N/ha. Between two varieties, Prodip was the best performer with 180 kg N/ha due to maximum nitrogen content and upake in grain and straw, maximum N use efficiency fertilizer recovery percentage and grain protein

    Response of potato to ash as an alternative source of potassic fertilizer

    Get PDF
    An experiment was carried out during rabi season of 2011-2012 in the experimental field of Soil Science, Bangladesh Agricultural University (BAU), Mymensingh. The objectives of present research work was to evaluate ash as an alternative source of potassic fertilizer for potato cultivation. The treatment combinations were i) Control (No K), ii) 100% K of recommended dose from muriate of potash (MoP), iii) 75% K from MoP+ 25% K from ash, iv) 50% K from MoP + 50% K from ash, v) 25% K from MoP + 75% K from ash, and vi) 100% K from ash. The result of the experiment indicated that various combinations of ash and MoP influenced the yield, yield contributing characters (length of the tubers, breadth of the tubers, number of tubers per hill, weight of tubers per hill, weight of ten tubers and gross yield of tubers per plot), K content of potato as well as weed infestation. Among the treatments the highest yield was obtained from 50% K from MoP + 50% from ash (T3) treated plot. The K content in the potato tuber and weed infestation was also highest for that plot. Considering the yield contributing parameters, yield and number of weeds the T3 (50% K from MoP + 50% K from ash) treatment was found more suitable than others

    Smart detection and prevention procedure for DoS attack in MANET

    Get PDF
    A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time

    In Silico Modeling and Immunoinformatics Probing Disclose the Epitope Based PeptideVaccine Against Zika Virus Envelope Glycoprotein

    Get PDF
    Zika virus (ZIKV) is an aedes mosquito borne pathogen belonging to the member of flaviviridae subgroup is the causative agent of an emerging disease called Zika fever, known as a benign infection usually presenting as influenza like illness with cutaneous rash. Due to recent epidemic outbreaks it is realized as a major health risk which need enhanced surveillance, but no attempt has been made to design an epitope based peptide vaccine against Zika virus. Viral envelope proteins are derived from host cell membrane proteins with some viral glycoproteins and are used to cover their protective protein capsid, help the viruses to enter host cells and help them to avoid the host immune response. In this study, amino acid sequence of ZIKV envelope glycoprotein was obtained from a protein database and examined with in silico approaches to determine the most immunogenic epitopes for B cell and T cell which could induce humoral as well as cell mediated immune response. Both the linear and conformational epitopes for B cell were predicted by immunoinformatics tools housed in IEDB resources. The peptide sequence DAHAKRQTVVVLGSQEGAV from position 121 and peptide sequence from 117-137 amino acids were predicted as most potential B cell linear and conformational epitopes respectively. Epitopes for CD4+ and CD8+ T cell were also predicted by using tools within IEDB resource and peptide sequence MMLELDPPF from position 250-258 amino acids was predicted as most immunogenic CD8+ T cell epitope with immune response evoking ability prediction score (I pMHC) of 0.09139 and conservancy of 52.17%. The innate immune response for ZIKV envelope glycoprotein was determined by interferon (IFN)-gamma effectuation and mimicking capacity by immunoinformatics and molecular docking study respectively. However, this is an introductory approach to design an epitope based peptide vaccine against Zika virus; we hope this model will be very much helpful in designing and predicting novel vaccine candidate
    corecore