12 research outputs found

    Design and Growth of Metal Oxide Film as Liquefied Petroleum Gas Sensors

    Get PDF
    Nowadays innovations in synthesis methods for metal oxide-based nanomaterials such as nanostructured and both physical and chemical route techniques have been adopted by various researchers around the world. The investigation has been focusing on various deposition parameters for fabricating nanostructured metal oxide. Gas sensors that use metal oxide materials are broadly utilized in industry to monitor combustion processes. While they are economical to powerful in high temperature environments, many of these instruments are not selective towards the species of interest when placed in a stream composed of multiple gases. Research on nanostructured metal oxide materials has generated great interest in scientific community. Metal oxide is a chemically stable, harmless, biocompatible, inexpensive material with very high dielectric constant and interesting photocatalytic activities. It is a wide-gap semiconductor and depending on its chemical composition, it shows a large range of electrical conductivity. Synthesis strategies regarding nanocomposites of metal oxide with other inorganic and organic materials sensing activities has been reviewed. The measure response of metal oxide film-based sensor highat low concentration of LPG

    Twelve-month observational study of children with cancer in 41 countries during the COVID-19 pandemic

    Get PDF
    Introduction Childhood cancer is a leading cause of death. It is unclear whether the COVID-19 pandemic has impacted childhood cancer mortality. In this study, we aimed to establish all-cause mortality rates for childhood cancers during the COVID-19 pandemic and determine the factors associated with mortality. Methods Prospective cohort study in 109 institutions in 41 countries. Inclusion criteria: children <18 years who were newly diagnosed with or undergoing active treatment for acute lymphoblastic leukaemia, non-Hodgkin's lymphoma, Hodgkin lymphoma, retinoblastoma, Wilms tumour, glioma, osteosarcoma, Ewing sarcoma, rhabdomyosarcoma, medulloblastoma and neuroblastoma. Of 2327 cases, 2118 patients were included in the study. The primary outcome measure was all-cause mortality at 30 days, 90 days and 12 months. Results All-cause mortality was 3.4% (n=71/2084) at 30-day follow-up, 5.7% (n=113/1969) at 90-day follow-up and 13.0% (n=206/1581) at 12-month follow-up. The median time from diagnosis to multidisciplinary team (MDT) plan was longest in low-income countries (7 days, IQR 3-11). Multivariable analysis revealed several factors associated with 12-month mortality, including low-income (OR 6.99 (95% CI 2.49 to 19.68); p<0.001), lower middle income (OR 3.32 (95% CI 1.96 to 5.61); p<0.001) and upper middle income (OR 3.49 (95% CI 2.02 to 6.03); p<0.001) country status and chemotherapy (OR 0.55 (95% CI 0.36 to 0.86); p=0.008) and immunotherapy (OR 0.27 (95% CI 0.08 to 0.91); p=0.035) within 30 days from MDT plan. Multivariable analysis revealed laboratory-confirmed SARS-CoV-2 infection (OR 5.33 (95% CI 1.19 to 23.84); p=0.029) was associated with 30-day mortality. Conclusions Children with cancer are more likely to die within 30 days if infected with SARS-CoV-2. However, timely treatment reduced odds of death. This report provides crucial information to balance the benefits of providing anticancer therapy against the risks of SARS-CoV-2 infection in children with cancer

    Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015)

    Get PDF

    Comparative Analysis of Cryptography Cipher Techniques

    No full text
    Abstract In today's scenario, Information Security is the most challenging aspects in the web and network application. Internet and network applications are growing fast. So the value and importance of the exchanged data over the internet or other type of media are increasing. To handle security threats modern data communications uses cryptography an effective, efficient, and essential component for secure transmission of information by implementing security parameters counting Confidentiality, Authentication, accountability, and accuracy. So, Cryptography is an example of the data security that converts information from its normal form into an unreadable form by using encryption techniques.. There are various encryption techniques have been proposed by the researchers over a period of time. But in our literature survey we compared the cipher techniques like Caesar Cipher, Playfair Cipher, and Feistel Cipher by using C programming language code with their execution time. In this paper, we have analysis and compare Caesar Cipher, Playfair Cipher, and Feistel Cipher and found relationships among them

    S2NOW: Secure Social Network Ontology Using WhatsApp

    No full text
    Communicating and sharing the ideas and feelings between human beings form the basis of social network. With the advent of different social network tools and applications, the task of networking between people has reached to next level, crossing bridges and boundaries. However, is there a connection or linkage between the frequent and sometime just random exchange of text messages between people using social network-based tools and applications and also are these messages secure? Or are they vulnerable to threat and attacks? Literature survey shows that very little work has been done in this direction. With this intention, in the current research work, a real-time case study has been taken identifying the creation of the social network between a group of persons who frequently chat using the WhatsApp Messenger application based on their common hobbies, choices, and areas of interest and applying cryptographic techniques to ensure the security of data (chats). The proposed study uses the Caesar Cipher Cryptographic Technique and newly proposed Block Quadra Crypto Technique for encrypting the chats and showcases a comparison between the two techniques. The results are encouraging and exceed the expectation
    corecore