175 research outputs found

    Permanent Anterior Teeth Fractures and Its impact on Oral Health related Quality of Life among 8-15 years Old School Children of Chennai City: A Cross Sectional survey

    Get PDF
    AIM : Tooth fracture is not only a distressing experience on physical level of a child, but it may also have an effect on emotional and psychological levels. This study aims to assess the various factors influencing permanent anterior teeth fractures and its impact on oral health related quality of life (OHRQoL) among 8-15 years old school children of Chennai city. MATERIALS AND METHODS : The cross sectional survey included all school going children aged 8-15 years with fracture of permanent anterior teeth. 30 schools (Corporation, Government aided and Private) were randomly selected by stratified random sampling. A written consent was obtained from both the parents/guardians and from the school children. A total of 7247 school children were screened and the 628 school children reported with permanent anterior teeth fractures comprised the sample for the study. Case record form was used to record the demographic details, various factors influencing tooth fractures by a customised structured questionnaire, oral health status by WHO oral health assessment form (1997), type of tooth fracture by Ellis and Davey’s classification (1970) and the OHRQoL using Child Oral Health Impact Profile (COHIP) by Hillary L. Border and Wilson-Genderson (2007). The data was tabulated and analysed using SPSS version 22. The normal distribution of the data were assessed by Normality tests Kolmogorov-Smirnov and Shapiro-Wilks tests. Chi-square test, Kruskal Wallis test, Bonferroni adjusted Mann Whitney test were used for analysing non-parametric data. One way ANOVA, Tukey’s HSD post hoc tests was used for comparison of anterior teeth fractures between schools. RESULTS : The prevalence of permanent anterior teeth fracture was found to be 8.7% among which boys were 3.5 times more likely for fracture than girls. Class I fracture was more prevalent (86.4%) among all reported fractures. 54.3% had negative OHRQoL, and 100% of the study participants had negative functional well-being, social/emotional well-being and school environment. Age, religion, socioeconomic status and type of school had significant influence on the impact of permanent anterior teeth fracture on OHRQoL. CONCLUSION : Facial appearance and oral health related problem can affect psychological and social wellbeing. All the children reporting with tooth fractures report negative oral health related quality of life especially in their functional wellbeing, socio-emotional wellbeing and in school environment domains. Hence the study stresses the importance of promoting good oral healthcare practices to prevent oral disease in children and to meet children’s unmet oral healthcare needs

    Hardy’s Wessex: An Imaginary-Literary-Topography

    Get PDF
    Geo - (topo) graphically Hardy’s Wessex is located on the West Country of England and lying south of the Thames and the Bristol Channel. The invention of “Wessex” is described by hardy in his preface to Far from the Madding Crowd in which, he first re- introduced the old word to give territorial definition. Travelling into Hardy, I wish to argue that place ought to receive special attention. Most of the writers have written their works with deep concerned with their native special attention. Place needs to be understood as something local, regional and real, despite the complexities and difficulties involved in the use of such terms. Generally, places themselves could have the sort of centrality in literary studies that has more frequently been given to notions such as author, character, text, historical context and narration etc. This paper wants to Geo - (topo) graphically appreciates the correspondence between Wessex and Hardy’s relationship in an imaginary and cartographical mode

    TWO STAGE SECURE MEDICAL DATA TRANSMISSION FOR IOT BASED E-HEALTH APPLICATION

    Get PDF
    Encryption cryptography is the process of encoding messages in a way that hackers cannot read it, but that can be authorized personnel. The two main algorithms used for data encryption in this work are the Advanced Encryption Standard (AES) and the Rivest-Shamir-Adleman (RSA) algorithm. AES is a symmetric cipher where the same key is used on both sides. It has a fixed message block size of 128 bits of text (plain or cipher), and keys of length 128,192, or 256 bits. When longer messages are sent, they are divided into 128-bit blocks. Apparently, longer keys make the cipher more difficult to break, but also enforce a longer encrypt and decrypt process. On the contrary, the RSA is a public key algorithm, which widely used in business and personal communication sectors. It has the advantage of having a variable key size ranging from (2-2048) bits. Due to the significant advancement of the internet of things (IoT) in the healthcare sector, the security and the integrity of the medical data became big challenges for healthcare services applications. This paper proposes a hybrid security model for securing the diagnostic text data in medical images. The proposed model is developed through integrating either 2D Discrete Wavelet Transform 1 Level (2D-DWT-1L) or 2D Discrete Wavelet Transform 2 Level (2D-DWT-2L) steganography technique with a proposed hybrid encryption scheme. The proposed hybrid encryption schema is built using a combination of Advanced Encryption Standard (AES), and Rivest, Shamir, and Adleman (RSA) algorithms. The proposed model starts by encrypting the secret data; then it hides the result in a cover image using 2D-DWT-1L or 2D-DWT-2L. Both color and gray-scale images are used as cover images to conceal different text sizes

    Cloud Assisted Mobile Access Of Health Data With Privacy And Audit Ability

    Get PDF
    — Monitoring and advising patients via mobile health care system is the current trend in medical field that acts as a life saver due to its availability at anytime and anywhere. This e-healthcare system requires patient’s private data to be available at cloud, outsourced data storage. This situation faces privacy issues. Hence the proposed approach focus on providing a private cloud for mobile users to ensure less cost, effective and secure storage. The data keyed in the mobile is transferred to private cloud, which in turn is processed and again transferred to public cloud. The sensitivity of the outsourced cloud data is maintained using Attribute based Encryption technique which restricts data access based on encrypt/decrypt of data with its access structures. The data privacy is ensured by PRF based key management and secures indexing methodologies. Personal Health records view ability access control to the actual data owner is the core idea of this project. The project segregates the access users in to Public Domain Users and Private Domain users

    Efficient Data Access in Disruption Tolerant Networks Using Cooperative Caching with DRAMA

    Get PDF
    Disruption Tolerant Networks (DTNs) is characterized by low node density and unpredictable node mobility. The current research efforts in DTN focus on data forward in gand reduce absence of end-to-end path between source and destination, but only limited work has been done on providing efficient data accesses to mobile users. In this paper, we propose a greatly improved energy efficiency strategy named DRAMA aimed to improve storing and fast accessing of data in cache and also it supports cooperative caching in DTNs, which makes the sharing and coordination of cached data among multiple nodes and reduces data access delay. Our idea is to cache data at a set of nodes as network central locations (NCLs), which can be easily accessed by other nodes in the network. We propose an efficient scheme to select appropriate NCL based on probabilistic selection metric and coordinates multiple caching nodes to optimize the trade-off between data accessibility and caching overhead

    Privacy Preservation and traceability support using Public Auditing Mechanism

    Get PDF
    as future enhancement, we enhance the Oruta system in two interesting problems we will continue to study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the original user) to reveal the identity of the signer based on verification metadata in some special situations. Since Oruta is based on ring signatures, where the identity of the signer is unconditionally protected, the current design of ours does not support traceability. To the best of our knowledge, designing an efficient public auditing mechanism with the capabilities of preserving identity privacy and supporting traceability is still open. Another problem for our future work is how to prove data freshness (prove the cloud possesses the latest version of shared data) while still preserving identity privacy

    Insilico interaction analysis of herbal bioactive molecules with Penicillin binding protein in staphylococcus aureus

    Get PDF
    Staphylococcus aureus is an opportunistic bacterial pathogen associated with asymptomatic colonization of the skin and mucosal surfaces of normal humans. Staphylococcus aureus isolates are often multidrug resistant. Antibiotics resistant Staphylococcus aureus is an emerging concern in the medical field. Due to their increasing resistance to numerous antibiotics, screening for alternate compound is required. Penicillin binding protein (PBP) was considered as an essential drug target for inhibiting bacterial growth. Molecular docking studies were performed to identify the lead molecule against Penicillin binding protein. Interaction of PBP with the plant derived compounds indicates the effective interaction of rosmarinic acid with highest fitness score and maximum number of hydrogen bonds (h-bonds). The study concludes that rosmarinic acid may be effective as an inhibitor for PBP and hence, can be regarded as a potential drug candidate for treating β-lactam resistant Staphylococcus aureu

    Effective Resource Allocation in flexible Overlay Routing

    Get PDF
    Overlay routing is the very attractive scheme that allows the improving certain properties of the routing without the need to change the standards of the current underlying routing. However, deploying overlay routing requires the placement and maintenance of overlay infrastructure. This gives rise to the following optimization problem: Find a minimal set of overlay nodes such that the required routing properties are satisfied. In this paper, we rigorously study this optimization problem. We show that it is NP- of the problem at hand. We examine the practical aspects of the scheme by evaluating the gain one can get over several hard and derive a nontrivial approximation algorithm for it, where the approximation ratio depends on specific properties real scenarios. The first one is BGP routing, and we show, using up-to-date data reflecting the current BGP routing policy in the Internet, that a relative small number of less than 100 relay servers is sufficient to enable routing over shortest paths from a single source to all autonomous systems (ASs), reducing the average path length of inflated paths by 40%. We also demonstrate that the scheme is very useful for TCP performance improvement (results in an almost optimal placement of overlay nodes) and for Voice-over-IP (VoIP) applications where a small number of overlay nodes can significantly reduce the maximal peer-to-peer delay.

    A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based

    Get PDF
    the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users, such as popular song or video, arguably requires less protection than a personal document, the copy of a payslip or the draft of an un submitted scientific paper. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as the data de duplication, ineffective. We present a novel idea that differentiates data according to their popularity. Based on this idea, we design an encryption scheme that the guarantees semantic security for the unpopular data and provides weaker security and better storage and bandwidth benefits for popular data

    Comparative mapping of Brassica juncea and Arabidopsis thaliana using Intron Polymorphism (IP) markers: homoeologous relationships, diversification and evolution of the A, B and C Brassica genomes

    Get PDF
    Background: Extensive mapping efforts are currently underway for the establishment of comparative genomics between the model plant, Arabidopsis thaliana and various Brassica species. Most of these studies have deployed RFLP markers, the use of which is a laborious and time-consuming process. We therefore tested the efficacy of PCR-based Intron Polymorphism (IP) markers to analyze genome-wide synteny between the oilseed crop, Brassica juncea (AABB genome) and A. thaliana and analyzed the arrangement of 24 (previously described) genomic block segments in the A, B and C Brassica genomes to study the evolutionary events contributing to karyotype variations in the three diploid Brassica genomes. Results: IP markers were highly efficient and generated easily discernable polymorphisms on agarose gels. Comparative analysis of the segmental organization of the A and B genomes of B. juncea (present study) with the A and B genomes of B. napus and B. nigra respectively (described earlier), revealed a high degree of colinearity suggesting minimal macro-level changes after polyploidization. The ancestral block arrangements that remained unaltered during evolution and the karyotype rearrangements that originated in the Oleracea lineage after its divergence from Rapa lineage were identified. Genomic rearrangements leading to the gain or loss of one chromosome each between the A-B and A-C lineages were deciphered. Complete homoeology in terms of block organization was found between three linkage groups (LG) each for the A-B and A-C genomes. Based on the homoeology shared between the A, B and C genomes, a new nomenclature for the B genome LGs was assigned to establish uniformity in the international Brassica LG nomenclature code. Conclusion: IP markers were highly effective in generating comparative relationships between Arabidopsis and various Brassica species. Comparative genomics between the three Brassica lineages established the major rearrangements, translocations and fusions pivotal to karyotype diversification between the A, B and C genomes of Brassica species. The inter-relationships established between the Brassica lineages vis-à-vis Arabidopsis would facilitate the identification and isolation of candidate genes contributing to traits of agronomic value in crop Brassicas and the development of unified tools for Brassica genomics
    • …
    corecore