47 research outputs found

    A cryptographic technique applying Laplace Transform and Exponetial Function

    Get PDF
    Secured Information transformation from one person to another is very much essential in this world of internet. In electronic communications such as system security, smart card, mobile communications etc, the data are stored in the various applications used in them. While using all the applications, we give permission to access all the information. Cryptography is based on transformation of multiple rounds of transformation of messages in the form of plain text as input into encrypted text message. Through suitable mathematical technique, secrecy of the information is maintained. This paper proposes a Laplace and its inverse transform technique with a suitable function for encryption and decryption of a message

    THE EFFECT OF EXCHANGE RATE, INFLATION, CAPITAL AND LABOR FORCE ON ECONOMIC GROWTH IN INDONESIA

    Get PDF
    AbstractThe study aimed to analyze the influence of exchange rate, Inflation, capital and labor force on economic growth in Indonesia. The data in this study are secondary data sourced from the Central Bureau of Statistics and Bank Indonesia which include data on the rupiah exchange rate against the dollar, inflation, gross domestic fixed capital formation, and labor rate. Analysis of this research based on the Cobb-Douglas Production Function by using the ordinary least square method (OLS) recursively. The results showed that the capital positively affects economic growth. By recursive method, inflation and exchange rate have a significant effect on economic growth. Inflation in particular has a significant negative impact on economic growth through interest rates and capital. However, the amount of labor has no significant effect on economic growth. This means that the government needs to reduce the inflation rate to be able to reduce the interest rate to increase the amount of capital and ultimately increase economic growth in Indonesia

    A prospective observational study on obesity related maternal and fetal complications at government headquarters hospital, Cuddalore

    Get PDF
    Background: The magnitude of the obesity prevalence has been increasing in developed and developing nation. This study was to find out the obesity related maternal and neonatal complications in Cuddalore district. Methods: This prospective observational COHORT study was carried out among the pregnant women for whom detailed history was obtained with complete general and physical examination. They were followed up to delivery and postpartum until discharge and the outcomes were studied.Results: The mean body mass index (BMI) of obese women was 32.42 and that of control women was 22.59. Obese women had increased incidence of gestational diabetes mellitus at 2.67%, gestational hypertension in obese group at 10.67%, caesarean delivery at 85.33% and needed induction at 89.33% when compared to control group at 1.33%, 5.33%, 36% and 72% respectively. Obese mothers of caesarean delivery (8%) had a prolonged hospital stay due to wound gaping and wound infections, when compared to mothers of control group (2.67%). Babies of obese mothers (16%) had a prolonged hospital stay due to respiratory distress, neonatal jaundice and macrosomia, when compared to babies of mothers from control group (2.67%). We found that 33.33% of obese women delivered babies of weight 3.5 kg and above, when compared to control group (6.67%) and some needed NICU admission (14.67%).Conclusions: The study confirmed from the population that obesity during pregnancy has increased number of complications like gestational diabetes, gestational hypertension, increased need for cesarean section, large babies needing NICU support

    PATTERN OF ADVERSE DRUG REACTIONS IN A TERTIARY CARE TEACHING HOSPITAL: A CROSS-SECTIONAL STUDY

    Get PDF
    ABSTRACTObjective: The aim of this study was to carry out adverse drug reactions (ADRs) monitoring in various departments of a tertiary care teaching hospital.Methods: A cross-sectional study was conducted on ADRs reported in the hospital from December 2012 to May 2013 after obtaining InstitutionalEthics Committee approval.Results: A total of 40 ADRs were reported, 47.50% were males and 52.50% were females. The female adult population was 45%. The majority of ADRswere due to antimicrobial agents especially beta-lactam antibiotics (42.5%) followed by NSAIDs (7.50%). A maximum number of patients (75%)were reported with dermatological manifestations. The department of medicine reported the highest number of ADRs (37.5%). As per Naranjo'sprobability scale, 62.5% reports were assessed as probable. 62.5% reports were documented as mild according to Modified Hartwig's criteria forseverity assessment.Conclusion: This study was done to sensitize the practicing physicians on the importance of adverse drug monitoring and reporting.Keywords: Pharmacovigilance, Adverse drug reactions, Tertiary care teaching hospital, Antimicrobial agents

    PRESCRIPTION PATTERN OF PROPHYLACTIC ANTIMICROBIAL AGENTS USED IN PREOPERATIVE PATIENTS AT A TERTIARY CARE TEACHING HOSPITAL

    Get PDF
    Objective: This study was designed to analyze the prescription pattern of prophylactic antimicrobial agents used in preoperative patients.Methods: A descriptive observational study was done at a tertiary care teaching hospital in Potheri from July to December 2013 after obtaining of Institutional Ethics Committee clearance.Results: Total 284 patients were included in this study, out of which 141(49.6%) were females and 143(50%) were males. In the department of general surgery, the very commonly used antimicrobial agents were cefotaxime (81%) followed by cefoperazone sodium (42%). In the orthopaedics department, the frequently used antimicrobial agents were cefoperazone and sulbactam (39%) followed by cefazolin (29%). Most commonly used antimicrobial agent was cefotaxime (100%) in gynaecology department.Conclusion: Antimicrobial prophylaxis is helpful in declining the frequency of post-operative infections. This study explained about the various antimicrobial agents used prior to surgeries. Practitioners must prescribe an antibiotic based on their hospital antibiotic policy

    NOVEL CRYPTOGRAPHIC APPROACH BASED ON PDF AND CDF

    Get PDF
    Secret Information sharing is all time requirement in this internet world, especially in Electronic communications such as system security, smart card, mobile communications etc. Cryptography is based on transformation of multiple rounds of transformation of messages in the form of plain text as input into encrypted text message. Through suitable mathematical technique, secrecy of the information is maintained. Many researchers have shown their interest in making use of mathematical techniques in Cryptography. This paper proposes a cryptographic technique using PDF and CDF. In this, plain text message is transformed as cipher text using a single key is used for both encryption and decryption. Using this proposed method, the information is also shared in safe manner and an illustration is done

    Few techniques of stability analysis for infectious disease employ the compartmental model

    Get PDF
    The cycle of life includes everything from joy to sorrow to good health to sickness. Most people have had a viral infection at some point in their lives, whether it was a small infections or the flu. It is amazing that a microscopic particle that cannot even be seen under a microscope and cannot even replicate on its own can enter any living creature and use the resources of that life form to create thousands of copies of the virus, some of which can even be fatal to the living species. Understanding the origin, means of prevention, means of control, and attempts at preventative measures are essential in the fight against these illnesses. It is immoral to experiment on infectious diseases, unlike other types of research. On the other hand, mathematical models can reasonably explain how the disease is spreading. This article focuses on few compartmental models and a technique to analyze the infectious disease. The control analysis technique which employ to comprehend how diseases move among the populations and where the controls are required. In this article Routh-Hurwitz criterion is employed to analyze the system of equations

    A Cryptographic Algorithm using Fuzzy Logic and Deck of Cards

    Get PDF
    Sharing of information in a secured manner is extremely essential in this world of internet technology. In recent times, many people come across situations wherein their personal data are being hacked by trespassers. These stolen data are used for many malpractices including theft of money. Many researchers involve themselves in finding a better path to overcome this difficulty. Cryptography plays a major role in bringing out a solution to rectify this issue. Mathematics provides a helping hand in most of the cryptographic techniques. It helps to secure data from hackers involved in the robbery of data. Fuzzy logic find its application in many field of research. This paper proposes a cryptographic technique which make use of fuzzy logic together with the help of deck of cards and its membership functional value

    Analyzing the Efficiency of a New Image Encryption Method Based on Aboodh Transformations

    Get PDF
    الهدف من هذا البحث هو تطوير طريقة تشفير فريدة من نوعها تستخدم طريقة Aboodh وتحويلها العكسي مع طريقة S-Box. تشير نتائج التقييمات إلى أن هذا العمل مناسب للاستخدام في تطبيقات التشفير الآمنة، ويوفر أدلة فيما يتعلق ببناء نظام تشفير للصور بناءً على السلوكيات المعقدة التي يوضحها. بعد تطبيق المنهجيات التي تم تقديمها لتصوير البيانات المأخوذة من مواقف الحياة الواقعية، تم تقييم النتائج باستخدام مجموعة واسعة من المعايير الإحصائية ومعايير الأداء. نتائج هذا التحقيق تؤدي إلى تحسين موثوقية نظام التشفير.The goal of this research is to develop a unique cryptographic method that makes use of Aboodh and its inverse transform in combination with the S-Box approach. The results of evaluations indicate that this work is appropriate for use in safe cryptographic applications, and it provides clues regarding the building of an image cryptosystem based on the complicated behaviors that it demonstrates. After applying the methodologies that have been provided to depict data taken from real-life situations, the results have been evaluated using a wide variety of statistical and performance criteria. The findings of this investigation result in an improvement to the reliability of the cryptosystem
    corecore