155 research outputs found

    New Algorithm For Detection of Spinal Cord Tumor using OpenCV

    Get PDF
    The spinal cord one of the most sensitive and significant parts of the human body lies protected inside the spine the backbone and contains bundles of nerves Any minor problem in the spinal cord can cause debilitation of internal and external functions of the human body One of the complications in the spinal cord is tumor - abnormal growth of tissue In this project we present a new algorithm based on OpenCV to detect spinal cord tumors from MRI sagittal image without human intervention The new algorithm can detect tumor-like substances adjacent to the spinal cord Tests carried out on spinal cord MRI images 33 cervical spinal images showed approximately 90 91 of accuracy rate in detecting tumor

    An Assessment to Human Perception to the Origin of Coronavirus by the Impact of Climate Change and Preventative Management of Pandemic Coronavirus COVID-19

    Get PDF
    On 12 January 2020, the WHO confirmed that a novel coronavirus was the cause of a respiratory illness in a cluster of people in Wuhan City, China. The aims of the study to assess the human perception to the origin of Coronavirus with relation to nature and find out preventative management about coronavirus. Primary data was collected for analyzing some factors regarding the Coronavirus microorganism formed by the impact of climate change. Primary data was collected through an online questionnaire survey. An online questionnaire survey is used for human perception for taking public opinion about the origin of Coronavirus and preventative management which are conducted in Bangladesh. SPSS software is used for Linear Regression analysis and correlation with some variables. A total of three variables were considered in the model estimation of which are dependent variables Coronavirus microorganism formed by the impact of climate change and independent variables such as Coronavirus microorganism formed by the impact of environmental pollution, Coronavirus microorganism formed by the impact of global heat and Coronavirus microorganism originated by the sources of the impact of ice melting polar region. From the analysis, it is found that the Coronavirus microorganism formed by the impact of climate change that makes a unique and statistically significant contribution to the prediction. Among 200 respondents, about 70% of peoples said “Maybe” Coronavirus microorganism formed by the impact of climate change, and it’s some factor. It is also found from the correlation analysis that the epidemic effects of COVID-19 will high on Bangladesh, if immigrant persons come, if Curfew doesn’t issue, if peoples are not conscious, if peoples are not properly using mask and hand gloves, if they are not maintaining social distance and lock down rules. In the finding that, in the polar region, there are many ice stacks where thousands of years ago, the animals are dead but the virus and bacteria are in a state of sleep. As the heat increases, all glaciers and permafrost start to melt in the Polar region. As a result, many types of viruses, bacteria are starting to live. These viruses including Coronavirus will be mixed with different environmental elements such as water, biodiversity. This will easily affect biodiversity and other animals including humans. Above all Climate change may play a significant role in the transmission of many infectious diseases including Coronavirus. Community responses are important for outbreak management during the early phase of major preventive options

    Global analyses of TetR family transcriptional regulators in mycobacteria indicates conservation across species and diversity in regulated functions

    Get PDF
    BACKGROUND: Mycobacteria inhabit diverse niches and display high metabolic versatility. They can colonise both humans and animals and are also able to survive in the environment. In order to succeed, response to environmental cues via transcriptional regulation is required. In this study we focused on the TetR family of transcriptional regulators (TFTRs) in mycobacteria. RESULTS: We used InterPro to classify the entire complement of transcriptional regulators in 10 mycobacterial species and these analyses showed that TFTRs are the most abundant family of regulators in all species. We identified those TFTRs that are conserved across all species analysed and those that are unique to the pathogens included in the analysis. We examined genomic contexts of 663 of the conserved TFTRs and observed that the majority of TFTRs are separated by 200 bp or less from divergently oriented genes. Analyses of divergent genes indicated that the TFTRs control diverse biochemical functions not limited to efflux pumps. TFTRs typically bind to palindromic motifs and we identified 11 highly significant novel motifs in the upstream regions of divergently oriented TFTRs. The C-terminal ligand binding domain from the TFTR complement in M. tuberculosis showed great diversity in amino acid sequence but with an overall architecture common to other TFTRs. CONCLUSION: This study suggests that mycobacteria depend on TFTRs for the transcriptional control of a number of metabolic functions yet the physiological role of the majority of these regulators remain unknown. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (doi:10.1186/s12864-015-1696-9) contains supplementary material, which is available to authorized users

    Relation of radial artery occlusion after trans-radial percutaneous coronary intervention with the duration of hemostatic compression

    Get PDF
    Background: Trans-radial percutaneous coronary intervention (PCI) in cardiac procedures accesses coronary arteries through the wrist's radial artery. Post-PCI, hemostatic compression on the radial artery prevents bleeding and aids healing. Radial artery occlusion (RAO), a possible complication, involves blockage of the radial artery. This study aimed to assess the relationship between radial artery occlusion after trans-radial percutaneous coronary intervention with the duration of hemostatic compression. Methods: This prospective observational study was conducted in the Department of Cardiology, National Institute of Cardiovascular Diseases (NICVD), Dhaka, Bangladesh, spanning from September 2018 to August 2019. The study enrolled 140 patients who underwent percutaneous coronary intervention (PCI) through the trans-radial approach (TRA), randomly assigned to two groups: Group I (2-hour hemostatic compression after PCI) and Group II (6-hour hemostatic compression post-procedure). Data analysis was performed using SPSS version 23.0. Results: In this study, early radial artery occlusion was observed in 4.3% of patients in group I and 12.8% in group II (P=0.04), while late radial artery occlusion occurred in 2.8% of patients in group I and 11.4% in group II, with a statistically significant difference (P=0.04). Multivariate logistic regression analysis identified a 6-hour hemostatic compression duration (P=0.01), post-procedural nitroglycerine use (P=0.03), and procedure time (P=0.03) as predictors of radial artery occlusion. Conclusions: Reduced hemostatic compression duration is linked to a decreased occurrence of both early and late radial artery occlusion following trans-radial intervention

    Smart detection and prevention procedure for DoS attack in MANET

    Get PDF
    A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time

    Effects of soil amendment and nitrogen levels on growth, yield and nitrogen uptake by rice plant under saline condition in Noakhali District, Bangladesh

    Get PDF
    A field experiment was conducted to evaluate the effect of different soil amendments and nitrogen levels on growth, yield and N uptake by rice (cv. BINA dhan10) under saline soil condition. Treatments consisted of three FYM and gypsum combinations in main plot viz. M1: gypsum @ 210 kg/ha, M2: FYM 3 t/ha + gypsum 140 kg/ha and M3: FYM 6 t/ha. Three nitrogen treatments assigned in sub-plots viz. N1: 75 kg N/ha, N2: 100 kg N/ha and N3: 125 kg N/ha. The study revealed that the combination of FYM and gypsum with and N levels produced the maximum grain yield of rice (6.07 t/ha) under the treatment combinations of M1N3, i.e. gypsum @ 210 kg/ha along with 125 kg N/ha

    Response of potato to ash as an alternative source of potassic fertilizer

    Get PDF
    An experiment was carried out during rabi season of 2011-2012 in the experimental field of Soil Science, Bangladesh Agricultural University (BAU), Mymensingh. The objectives of present research work was to evaluate ash as an alternative source of potassic fertilizer for potato cultivation. The treatment combinations were i) Control (No K), ii) 100% K of recommended dose from muriate of potash (MoP), iii) 75% K from MoP+ 25% K from ash, iv) 50% K from MoP + 50% K from ash, v) 25% K from MoP + 75% K from ash, and vi) 100% K from ash. The result of the experiment indicated that various combinations of ash and MoP influenced the yield, yield contributing characters (length of the tubers, breadth of the tubers, number of tubers per hill, weight of tubers per hill, weight of ten tubers and gross yield of tubers per plot), K content of potato as well as weed infestation. Among the treatments the highest yield was obtained from 50% K from MoP + 50% from ash (T3) treated plot. The K content in the potato tuber and weed infestation was also highest for that plot. Considering the yield contributing parameters, yield and number of weeds the T3 (50% K from MoP + 50% K from ash) treatment was found more suitable than others

    Response of yield, nitrogen use efficiency and grain protein content of wheat (Triticum aestivum L.) varieties to different nitrogen levels

    Get PDF
    A field experiment was carried out in order to investigate the response of nitrogen use efficiency and yield of two wheat varieties to different nitrogen levels. The wheat varieties, viz. Bijoy (V1) and Prodip (V2) were tested under 4 levels of nitrogen (N0 = 0 kg N/ha, N1 = 60 kg N/ha, N2 = 120 kg N/ha and N3 = 180 kg N/ha) where wheat varieties assigned in main plot and nitrogen treatments in subplot. Grain yield was increased with increasing rates of nitrogen. Maximum grain yield (3.85 kg/ha) produced by the variety Prodip when N applied @ 180 kg/ha and minimum (1.15 kg/ha) by the variety Bijoy under control treatments. Interactions of two variety and nitrogen levels; N uptake by grain and straw increased with increasing nitrogen levels. Highest N uptake by grain (90.60 kg/ha) and straw (25.53 kg/ha) were observed from the variety Prodip with 180 kg N/ha. Highest (38.66) N use efficiency (NUE) was noticed in Prodip when received 60 kg N/ha. Grain protein (%) also showed maximum value (14.29) when Prodip fertilized with 180 kg N/ha. Between two varieties, Prodip was the best performer with 180 kg N/ha due to maximum nitrogen content and upake in grain and straw, maximum N use efficiency fertilizer recovery percentage and grain protein
    corecore