8,747 research outputs found

    Himalayan P waves in COPD - A Rare Feature

    Get PDF
    Himalayan or giant P-waves (amplitude =5 mm) are often known to be classically associated with congenital heart diseases with right to left shunt like tricuspid atresia, Ebstein anomaly, combined tricuspid and pulmonic stenosis, etc, where they indicate a dilated right atrium and tend to be persistent. These type P waves are rarely seen in chronic obstructive pulmonary disease (COPD) and in this condition it may be due to structural right atrial changes or hypoxemia or combination of both. Here we report a case of COPD with Himalayan P waves which is a rare entity

    Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network

    Get PDF
    The rapid integration of Internet of Things (IoT) services and applications across various sectors is primarily driven by their ability to process real-time data and create intelligent environments through artificial intelligence for service consumers. However, the security and privacy of data have emerged as significant threats to consumers within IoT networks. Issues such as node tampering, phishing attacks, malicious code injection, malware threats, and the potential for Denial of Service (DoS) attacks pose serious risks to the safety and confidentiality of information. To solve this problem, we propose an integrated autonomous IoT network within a cloud architecture, employing Blockchain technology to heighten network security. The primary goal of this approach is to establish a Heterogeneous Autonomous Network (HAN), wherein data is processed and transmitted through cloud architecture. This network is integrated with a Reinforced Neural Network (RNN) called ClouD_RNN, specifically designed to classify the data perceived and collected by sensors. Further, the collected data is continuously monitored by an autonomous network and classified for fault detection and malicious activity. In addition, network security is enhanced by the Blockchain Adaptive Windowing Meta Optimization Protocol (BAWMOP). Extensive experimental results validate that our proposed approach significantly outperforms state-of-the-art approaches in terms of throughput, accuracy, end-to-end delay, data delivery ratio, network security, and energy efficiency

    Hydrogel Nanocomposite Adsorbents and Photocatalysts for Sustainable Water Purification

    Get PDF

    AI-Based Sustainable and Intelligent Offloading Framework for IIoT in Collaborative Cloud-Fog Environments

    Get PDF
    The cloud paradigm is one of the most trending areas in today’s era due to its rich profusion of services. However, it fails to serve the latency-sensitive Industrial Internet of Things (IIoT) applications associated with automotives, robotics, oil and gas, smart communications, Industry 5.0, etc. Hence, to strengthen the capabilities of IIoT, fog computing has emerged as a promising solution for latency-aware IIoT tasks. However, the resource-constrained nature of fog nodes puts forth another substantial issue of offloading decisions in resource management. Therefore, we propose an Artificial Intelligence (AI)-enabled intelligent and sustainable framework for an optimized multi-layered integrated cloud fog-based environment where real-time offloading decisions are accomplished as per the demand of IIoT applications and analyzed by a fuzzy based offloading controller. Moreover, an AI based Whale Optimization Algorithm (WOA) has been incorporated into a framework that promises to search for the best possible resources and make accurate decisions to ameliorate various Quality-of-Service (QoS) parameters. The experimental results show an escalation in makespan time up to 37.17%, energy consumption up to 27.32%, and execution cost up to 13.36% in comparison to benchmark offloading and allocation schemes

    Dietary fatty acid composition alters 11β-hydroxysteroid dehydrogenase type 1 gene expression in rat retroperitoneal white adipose tissue

    Get PDF
    The enzyme 11β-hydroxysteroid dehydrogenase type 1 (11β-HSD1) amplifies intracellular glucocorticoid action by converting inactive glucocorticoids to their active forms in vivo. Adipose-specific overexpression of 11β-HSD1 induces metabolic syndrome in mice, whereas 11β-HSD1 null mice are resistant to it. Dietary trans and saturated fatty acids (TFAs and SFAs) are involved in the development of metabolic syndrome, whereas polyunsaturated fatty acids (PUFA) offer protection against this. Here, we report the effects of chronic feeding of different diets containing vanaspati (TFA rich), palm oil (SFA rich) and sunflower oil (PUFA rich) at 10%level on 11β-HSD1 gene expression in rat retroperitoneal adipose tissue. 11β-HSD1 gene expression was significantly higher in TFA rich diet-fed rats compared to SFA rich diet-fed rats, which in turn was significantly higher than PUFA rich diet-fed rats. Similar trend was observed in the expression of CCAAT-enhancer binding protein-α (C/EBP-α), the main transcription factor required for the expression of 11β-HSD1. We propose that TFAs and SFAs increase local amplification of glucocorticoid action in adipose tissue by upregulating 11β-HSD1 by altering C/EBP-α-gene expression. The increased levels of glucocorticoids in adipose tissue may lead to development of obesity and insulin resistance, thereby increasing the risk of developing metabolic syndrome

    Design and Implementation of Secure Location Service Using Software Engineering Approach in the Age of Industry 4.0

    Get PDF
    Data privacy and security are major concerns in any location-based system. In majority of location-based systems, data security is ensured via data replacement policies. Data replacement or hiding policy requires additional measures for providing required security standards for Industry 4.0. Whereas, cryptography primitives and protocols are integral part of any network and can be re-used for ensuring user’s locations in Industry 4.0 based applications. In this work, an application has been designed and developed that used RSA encryption/decryption algorithm for ensuring location data’s confidentiality. The proposed system is distributed in nature and gives access to location’s information after users get authenticated and authorized. In the proposed system, a threshold-based subset mechanism is adopted for keys and their storage. Server is designed to securely store the location information for clients and provide this information to those set of clients or users who are able to verify sum of subset of keys. This work has elaborated the location-based data confidentiality designs in a distributed client/server environment and presented the in-depth system working with different flow diagrams. The command line and graphical User Interface (GUI)-based implementation shows that the proposed system is capable of working with standard system requirements (i5 processor, 4 GB RAM and 64-bits operating system). In addition to location information, system is able to provide much important information (including IP address, timestamp, time to access, hop count) that enhances the overall system capabilities

    Cholecystocutaneous Fistula Secondary to Chronic Calculous Cholecystitis

    Get PDF
    Spontaneous cholecystocutaneous fistula is an exceptionally unusual complication of chronic calculous cholecystitis now. The remarkable drop in incidence is probably associated with the introduction of antimicrobial therapy and early surgical management of biliary tract disease. We report a case of spontaneous cholecystocutaneous fistula in a patient who presented with an abscess in the right upper quadrant

    Normality and smoothness of simple linear group compactifications

    Get PDF
    If G is a complex semisimple algebraic group, we characterize the normality and the smoothness of its simple linear compactifications, namely those equivariant GxG-compactifications which possess a unique closed orbit and which arise in a projective space of the shape P(End(V)), where V is finite dimensional rational G-module. Both the characterizations are purely combinatorial and are expressed in terms of the highest weights of V. In particular, we show that Sp(2r) (with r > 0) is the unique non-adjoint simple group which admits a simple smooth compactification.Comment: v2: minor changes, final version. To appear in Math.
    • …
    corecore