46 research outputs found

    Patellar Tendinopathy: “Jumper’s Knee”

    Get PDF
    “Patellar tendinopathy” is also known as “Jumper’s knee” and is a common cause of impaired function in athletes who participate in sports that require jumping and running activities. The exact etiology of disease is still unknown and several theories have been postulated for its pathogenesis. It usually presents as anterior knee pain that is related to the sports activity and might lead to decreased sports participation. USG and MRI are the main modality of investigation that aids in the diagnosis. Non-operative therapy forms the main stay of treatment in form of rest, brace, physical therapy and anti-inflammatory medications. Other adjuncts such as cryotherapy, corticosteroids injection, platelet -rich plasma injections and electrical therapy like TENS or ESWT have been used with some success. Operative intervention in form of open or arthroscopic procedures are reserved for chronic and refractory cases

    A New Improved Approach for Feature Generation and Selection in Multi-Relational Statistical Modelling using ML

    Get PDF
    1095-1100Multi-relational classification is highly challengeable task in data mining, because so much data in our world is organised in multiple relations. The challenge comes from the huge collection of search spaces and high calculation cost arises in the selection of feature due to excessive complexity in the various relations. The state-of-the-art approach is based on clusters and inductive logical programming to retrieve important features and derived hypothesis. However, those techniques are very slow and unable to create enough data and information to produce efficient classifiers. In the given paper, we proposed a fast and effective method for the feature selection using multi-relational classification. Moreover we introduced the natural join and SVM based feature selection in multi-relation statistical learning. The performance of our model on various datasets indicates that our model is efficient, reliable and highly accurate

    A New Efficient Method for the Detection of Intrusion in 5G and beyond Networks using ML

    Get PDF
    60-65The 5G networks are very important to support complex application by connecting different types of machines and devices, which provide the platform for different spoofing attacks. Traditional physical layer and cryptography authentication methods are facing problems in dynamic complex environment, including less reliability, security overhead also problem in predefined authentication system, giving protection and learn about time-varying attributes. In this paper, intrusion detection framework has been designed using various machine learning methods with the help of physical layer attributes and to provide more efficient system to increase the security. Machine learning methods for the intelligent intrusion detection are introduced, especially for supervised and non-supervised methods. Our machine learning based intelligent intrusion detection technique for the 5G and beyond networks is evaluated in terms of recall, precision, accuracy and f-value are validated for unpredictable dynamics and unknown conditions of networks

    Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme

    Get PDF
    Mobile AdHoc Networks (MANETs) are the network of self-configuring nodes. Such nodes communicate through single as well as multi-hop modes without the aid of any centralized administrator or pre-existing network infrastructure. Due to this reason, MANETs have gained a highly significance in modern wireless networking technologies. Such networks are extremely vulnerable to one of the security attack i.e. blackhole attack. It is a malicious node when an attacker is able to send a fake route reply to the originator of a route request packet. Such attackers discard the legitimate packets and replay packets in the whole network thereby adversely affecting network performance. Most of the security protocols for MANET are using bilinear pairing methods to provide security against security attacks and it takes high computing cost for the computation of pairing operations. Nowadays, researchers are using certificate-less signature schemes in distributed environments to provide efficient security. This signature scheme is very popular because it does not use any certificate authority for the management of security certificates. In this paper, we proposed an efficient technique to prevent blackhole attack in MANET using RSA-based certificateless signature scheme without using any bilinear pairing operations. Our scheme provides security against forgery and blackhole attacks and is evaluated under a discrete logarithm problem. Proposed scheme outperforms existing schemes in terms of these metrics viz., throughput, packet delivery ratio, routing overhead and end-to-end delay when we are varying mobility and fixed percentage of malicious nodes. Our proposed scheme not only detects or prevents the blackhole attack but it is also capable to provide important security services viz., integrity, authentication and non-repudiation

    Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries

    Get PDF
    Abstract Background Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres. Methods This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries. Results In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia. Conclusion This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries

    Linear Connectivity Problems in Directed Hypergraphs

    Get PDF
    We introduce a notion of hyperconnection (formally denoted L-hyperpath) between nodes in a directed hypergraph and relate this notion to existing notions of hyperpaths in directed hypergraphs. We show that some interesting questions in problem domains such as secret transfer protocols and routing in packet filtered networks are basically questions about the existence of L-hyperpaths in directed hypergraphs. We study the computational complexity of problems related to L-hyperpaths and the L-cyclomatic number of directed hypergraphs (the minimum number of hyperedges that need to be deleted to make a directed hypergraph free of L-hypercycles). We prove that the L-hyperpath existence problem, the L-cyclomatic number problem, the minimum L-cyclomatic set problem, and the minimal L-cyclomatic, Πp, and DP, respectively. set problem are each complete for the complexity class NP, Σ p 2

    Complexity of linear connectivity problems in directed hypergraphs

    No full text
    Abstract. We introduce a notion of linear hyperconnection (formally denoted L-hyperpath) between nodes in a directed hypergraph and relate this notion to existing notions of hyperpaths in directed hypergraphs. We observe that many interesting questions in problem domains such as secret transfer protocols, routing in packet filtered networks, and propositional satisfiability are basically questions about existence of L-hyperpaths or about cyclomatic number of directed hypergraphs w.r.t. L-hypercycles (the minimum number of hyperedges that need to be deleted to make a directed hypergraph free of L-hypercycles). We prove that the L-hyperpath existence problem, the cyclomatic number problem, the minimum cyclomatic set problem, and the minimal cyclo-matic set problem are each complete for a different level (respectively,, and DP) of the polynomial hierarchy. NP, Σ p 2, Πp

    ELEMENTS OF COST OVERRUNS,DELAYS AND RISK IN CONSTRUCTION MANAGEMENT

    No full text
    One of the leading contributorsto Indian economy i.e. the construction industry is criticized many times for delays in the projects.The delay in the projects effects on track recordof construction industry. It alsoresults in low customer satisfaction.On the other hand, the delay in construction projects increases the cost of the project.The industryis coming up with the complicated construction projects with dependencies on skilled workforce.Different requirements are to be fulfilled in the stipulated time frame.Hence the success of any project depends upon two important factors viz. cost and time required to complete the project.The planning of the project with application of the principles like total quality enhancement and supply management will result in better performance of the team to deliver the project.The paper presents the overview of the different parameters affecting the cost and budget and the risks involved in the construction projects
    corecore