187 research outputs found

    Comparative Pressure Drop in Laminar and Turbulent Flows in Circular Pipe with and without Baffles using FEV

    Full text link
    The study of Turbulent flow characteristics in complex geometries receives considerable attention due to its Importance in many engineering applications and has been the subject of interest for researchers. Some of these include the energy conversion systems found in same design of heat exchangers, nuclear reactor, solar collectors & cooling of industrial machines and electronic components. Flow in channels with baffle plates occurs in many industrial applications such as heat exchangers, filtration, chemical reactors, and desalination. These baffles cause turbulence which leads to increases friction within the pipe or duct and leads significant pressure drop. This work is concern with the comparative flow and pressure distribution analysis of a smooth and segmented Baffles pipe. In which pressure drop during the flow is examined and with the help of hydrodynamic characteristics performance is predicted with the help of Finite element volume tool ANSYS- Fluent, where simulation is been done. The goal is to carry out evaluating pressure drop across the pipe using different turbulent model and at simulation is done for wide range of Reynolds number in both laminar and turbulent flow regimes. The FEV results are validated with well published results in literature and furthermore with experimentation. The FEV and experimental results show good agreement

    CYBER PORNOGRAPHY ADDICTION AMONGST MEDICAL STUDENTS OF WESTERN RURAL MAHARASHTRA

    Get PDF
    Introduction: Cyberpornography is an act of using cyberspace to create, display, distribute, impart or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyberpornography on one hand, has opened up the new terrain of \u27safe sex\u27, and a positive space for sexual non-conformists. At the same time, it has negatively impacted many offline relations, and a new space for sexual predation and exploitation. Objective: To find out the prevalence, type and form of risk towards cyber pornography addiction amongst the students. Methods & Materials: A prospective cross sectional study was conducted after obtaining an ethical approval from the institute and an informed consent from volunteers fulfilling the eligibility criteria. The Internet sex screening test (ISST) questionnaire with score sheet was used and was collected by complete anonymity and confidentiality. 300 medical students were considered for the study and data collected was analysed by Microsoft-office excel. Results: 57.15% of the volunteer are in low-risk group whereas 30% are vulnerable and 12.85% are in highest-risk group. For boys, 65% are vulnerable whereas 21% in low-risk and the remaining 14% are in highest-risk group. For girls, 73% are in a low-risk, 19% are vulnerable and 8% are in highest-risk group. Conclusion: It is concluded that the majority of boys come under vulnerable category whereas the girls comes in low-risk group showing male preponderance towards addiction. The study reveals that, questions coming under the subgroup of online sexual behaviour-isolated have been answered the maximum number of times, by both the sexes. Whereas, the questions coming under the subgroup of online sexual spending has been answered the least by both the sexes. KEYWORDS: Cyberpornography; Addiction; Sexual behaviour; ISST Questionnaire

    CYBER PORNOGRAPHY ADDICTION AMONGST MEDICAL STUDENTS OF WESTERN RURAL MAHARASHTRA

    Get PDF
    Introduction: Cyberpornography is an act of using cyberspace to create, display, distribute, impart or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyberpornography on one hand, has opened up the new terrain of 'safe sex', and a positive space for sexual non-conformists. At the same time, it has negatively impacted many offline relations, and a new space for sexual predation and exploitation. Objective: To find out the prevalence, type and form of risk towards cyber pornography addiction amongst the students. Methods & Materials: A prospective cross sectional study was conducted after obtaining an ethical approval from the institute and an informed consent from volunteers fulfilling the eligibility criteria. The Internet sex screening test (ISST) questionnaire with score sheet was used and was collected by complete anonymity and confidentiality. 300 medical students were considered for the study and data collected was analysed by Microsoft-office excel. Results: 57.15% of the volunteer are in low-risk group whereas 30% are vulnerable and 12.85% are in highest-risk group. For boys, 65% are vulnerable whereas 21% in low-risk and the remaining 14% are in highest-risk group. For girls, 73% are in a low-risk, 19% are vulnerable and 8% are in highest-risk group. Conclusion: It is concluded that the majority of boys come under vulnerable category whereas the girls comes in low-risk group showing male preponderance towards addiction. The study reveals that, questions coming under the subgroup of online sexual behaviour-isolated have been answered the maximum number of times, by both the sexes. Whereas, the questions coming under the subgroup of online sexual spending has been answered the least by both the sexes. KEYWORDS: Cyberpornography; Addiction; Sexual behaviour; ISST Questionnaire

    Centralized Cloud Service Providers in Improving Resource Allocation and Data Integrity by 4G IoT Paradigm

    Get PDF
    Due to the expansion of Internet of Things (IoT), the extensive wireless, and 4G networks, the rising demands for computing calls and data communication for the emergent EC (EC) model. By stirring the functions and services positioned in the cloud to the user proximity, EC could offer robust transmission, networking, storage, and transmission capability. The resource scheduling in EC, which is crucial to the accomplishment of EC system, has gained considerable attention. This manuscript introduces a new lighting attachment algorithm based resource scheduling scheme and data integrity (LAARSS-DI) for 4G IoT environment. In this work, we introduce the LAARSS-DI technique to proficiently handle and allot resources in the 4G IoT environment. In addition, the LAARSS-DI technique mainly relies on the standard LAA where the lightning can be caused using the overall amount of charges saved in the cloud that leads to a rise in electrical intensity. Followed by, the LAARSS-DI technique designs an objective function for the reduction of cost involved in the scheduling process, particularly for 4G IoT environment. A series of experimentation analyses is made and the outcomes are inspected under several aspects. The comparison study shown the improved performance of the LAARSS-DI technology to existing approaches

    Study of diameter, length, tortuosity of splenic artery and its branches with its clinical implications

    Get PDF
    Background: Systematic knowledge of the splenic arterial vasculature would provide greater safeguards in the design of the surgical techniques but there are surprisingly few studies on the subject. For this reason, we studied morphological anatomy of splenic artery. Aims: To study morphological anatomy of splenic artery and clinical implications. The present study aims to report length, tortuosity, diameter of splenic artery and its branches. Material and Method: The measurements were taken on 50 donated embalmed cadavers irrespective of the sex in the Department of Anatomy, MGM Medical College, Navi Mumbai, Maharashtra. The findings were noted after dissection. The study was carried out between May 2009 to December 2012. Results: The mean length of splenic artery with tortuosity was 9.52 cm. The mean length of splenic artery without tortuosity was 12.76 cm. The splenic artery shows numerous tortuosities. The tortuosity decreases as the diameter increases. We found that superior polar branch was slender and thin can be easily damaged. To avoid this operation should start from inferior pole. The mean diameter of splenic artery was 5.144 mm that of superior ramus was 4.340 mm and inferior ramus was 3.760 mm. So we found weak inferior ramus supplying the lower pole of spleen. Due to which inferior pole was also supplied by additional branches. Conclusion: Knowledge of splenic artery has the clinical significance in planning and conducting procedures such as partial or total splenectomy, splenic aneurysm, splenic embolisation, splenography, surgical and radiological procedures of upper abdominal region to avoid any complications

    Lightweight novel trust based framework for IoT enabled wireless network communications

    Get PDF
    For IoT enabled networks, the security and privacy is one of the important research challenge due to open nature of wireless communications, especially for the networks like Vehicular Ad hoc Networks (VANETs). The characteristics like heterogeneity, constrained resources, scalability requirements, uncontrolled environment etc. makes the problems of security and privacy even more challenging. Additionally, the high degree of availability needs of IoT networks may compromise the integrity and confidentially of communication data. The security threats mainly performed during the operations of data routing, hence designing the secure routing protocol main research challenge for IoT networks. In this paper, to design the lightweight security algorithm the use of Named Data Networking (NDN) which provides the benefits applicable for IoT applications like built-in data provenance assurance, stateful forwarding etc. Therefore the novel security framework NDN based Cross-layer Attack Resistant Protocol (NCARP) proposed in this paper. In NCARP, we designed the cross-layer security technique to identify the malicious attackers in network to overcome the problems like routing overhead of cryptography and trust based techniques. The parameters from the physical layer, Median Access Control (MAC) layer, and routing/network layer used to compute and averages the trust score of each highly mobility nodes while detecting the attackers and establishing the communication links. The simulation results of NCARP is measured and compared in terms of precision, recall, throughput, packets dropped, and overhead rate with state-of-art solutions

    Revealing nature of GRB 210205A, ZTF21aaeyldq (AT2021any), and follow-up observations with the 4K×\times4K CCD Imager+3.6m DOT

    Get PDF
    Optical follow-up observations of optical afterglows of gamma-ray bursts are crucial to probe the geometry of outflows, emission mechanisms, energetics, and burst environments. We performed the follow-up observations of GRB 210205A and ZTF21aaeyldq (AT2021any) using the 3.6m Devasthal Optical Telescope (DOT) around one day after the burst to deeper limits due to the longitudinal advantage of the place. This paper presents our analysis of the two objects using data from other collaborative facilities, i.e., 2.2m Calar Alto Astronomical Observatory (CAHA) and other archival data. Our analysis suggests that GRB 210205A is a potential dark burst once compared with the X-ray afterglow data. Also, comparing results with other known and well-studied dark GRBs samples indicate that the reason for the optical darkness of GRB 210205A could either be intrinsic faintness or a high redshift event. Based on our analysis, we also found that ZTF21aaeyldq is the third known orphan afterglow with a measured redshift except for ZTF20aajnksq (AT2020blt) and ZTF19abvizsw (AT2019pim). The multiwavelength afterglow modelling of ZTF21aaeyldq using the afterglowpy package demands a forward shock model for an ISM-like ambient medium with a rather wider jet opening angle. We determine circumburst density of n0n_{0} = 0.87 cm3^{-3}, kinetic energy EkE_{k} = 3.80 ×1052\times 10^{52} erg and the afterglow modelling also indicates that ZTF21aaeyldq is observed on-axis (θobs<θcore\theta_{obs} < \theta_{core}) and a gamma-ray counterpart was missed by GRBs satellites. Our results emphasize that the 3.6m DOT has a unique capability for deep follow-up observations of similar and other new transients for deeper observations as a part of time-domain astronomy in the future.Comment: Accepted for Special Issue of Journal of Astrophysics and Astronomy, 2022, Astrophysical jets and observational facilities: National perspective, 05 -09 April 2021, ARIES Nainita

    Stabilities of nanohydrated thymine radical cations: insights from multiphoton ionization experiments and ab initio calculations

    Get PDF
    Multi-photon ionization experiments have been carried out on thymine-water clusters in the gas phase. Metastable H2O loss from T+(H2O)n was observed at n ≥ 3 only. Ab initio quantum-chemical calculations of a large range of optimized T+(H2O)n conformers have been performed up to n = 4, enabling binding energies of water to be derived. These decrease smoothly with n, consistent with the general trend of increasing metastable H2O loss in the experimental data. The lowest-energy conformers of T+(H2O)3 and T+(H2O)4 feature intermolecular bonding via charge-dipole interactions, in contrast with the purely hydrogen-bonded neutrals. We found no evidence for a closed hydration shell at n = 4, also contrasting with studies of neutral clusters

    Genome-wide association study for acute otitis media in children identifies FNDC1 as disease contributing gene

    Get PDF
    Acute otitis media (AOM) is among the most common pediatric diseases, and the most frequent reason for antibiotic treatment in children. Risk of AOM is dependent on environmental and host factors, as well as a significant genetic component. We identify genome-wide significance at a locus on 6q25.3 (rs2932989, Pmeta=2.15 × 10-09), and show that the associated variants are correlated with the methylation status of the FNDC1 gene (cg05678571, P=1.43 × 10-06), and further show it is an eQTL for FNDC1 (P=9.3 × 10-05). The mouse homologue, Fndc1, is expressed in middle ear tissue and its expression is upregulated upon lipopolysaccharide treatment. In this first GWAS of AOM and the largest OM genetic study to date, we identify the first genome-wide significant locus associated with AOM

    Omega-3 Fatty Acid Deficiency during Brain Maturation Reduces Neuronal and Behavioral Plasticity in Adulthood

    Get PDF
    Omega-3-fatty acid DHA is a structural component of brain plasma membranes, thereby crucial for neuronal signaling; however, the brain is inefficient at synthesizing DHA. We have asked how levels of dietary n-3 fatty acids during brain growth would affect brain function and plasticity during adult life. Pregnant rats and their male offspring were fed an n-3 adequate diet or n-3 deficient diets for 15 weeks. Results showed that the n-3 deficiency increased parameters of anxiety-like behavior using open field and elevated plus maze tests in the male offspring. Behavioral changes were accompanied by a level reduction in the anxiolytic-related neuropeptide Y-1 receptor, and an increase in the anxiogenic-related glucocorticoid receptor in the cognitive related frontal cortex, hypothalamus and hippocampus. The n-3 deficiency reduced brain levels of docosahexaenoic acid (DHA) and increased the ratio n-6/n-3 assessed by gas chromatography. The n-3 deficiency reduced the levels of BDNF and signaling through the BDNF receptor TrkB, in proportion to brain DHA levels, and reduced the activation of the BDNF-related signaling molecule CREB in selected brain regions. The n-3 deficiency also disrupted the insulin signaling pathways as evidenced by changes in insulin receptor (IR) and insulin receptor substrate (IRS). DHA deficiency during brain maturation reduces plasticity and compromises brain function in adulthood. Adequate levels of dietary DHA seem crucial for building long-term neuronal resilience for optimal brain performance and aiding in the battle against neurological disorders
    corecore