540 research outputs found

    A solitary giant cell tumor of the tendon sheath of left third finger in a 23-year-old man: a case report

    Get PDF
    Giant cell tumor of the tendon sheath (GCTTS) is a common condition usually encountered in middle aged men, usually seen on the thumb, index, middle fingers. These benign tumors are known to reoccur. Re-occurrence can be attributed to poor surgical technique, excision of the tumor in toto is considered difficult given the close proximity of the digital nerves, blood vessels, tendons to the tumor. A magnifying loop is usually used in these cases to identify and resect the satellite lesions. In this case report, we are presenting a case of solitary GCTTS of the tendon sheath in a 23-year-old man with history of gradually progressive painless swelling over his left third finger. Musculo-skeletal ultrasound revealed a heterogeneously hypo-echoic well-defined lesion over the ventral aspect of the left third finger. Histopathology showed giant cell morphology. Patient underwent exploration, tumor excision in toto with primary suturing in our institute with an uneventful postoperative period. No loss of range of movements of the PIP, DIP joints was noted in the postoperative period. Good dissection with excision of the tumor in toto gives better outcomes

    SECURE DEPENDABLE SELECTIVE STORAGE SERVICES AND SUPPORT FOR DYNAMIC DATA OPERATIONS IN CLOUD COMPUTING

    Get PDF
    Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data

    LOCC distinguishability of unilaterally transformable quantum states

    Full text link
    We consider the question of perfect local distinguishability of mutually orthogonal bipartite quantum states, with the property that every state can be specified by a unitary operator acting on the local Hilbert space of Bob. We show that if the states can be exactly discriminated by one-way LOCC where Alice goes first, then the unitary operators can also be perfectly distinguished by an orthogonal measurement on Bob's Hilbert space. We give examples of sets of N<=d maximally entangled states in d⊗dd \otimes d for d=4,5,6 that are not perfectly distinguishable by one-way LOCC. Interestingly for d=5,6 our examples consist of four and five states respectively. We conjecture that these states cannot be perfectly discriminated by two-way LOCC.Comment: Revised version, new proofs added; to appear in New Journal of Physic

    Choroidal osteoma with CNVM – Successful treatment with intravitreal Bevacizumab

    Get PDF
    AbstractTwenty-seven years old healthy woman presented with complaints of sudden painless blurred vision in right eye for 1week. On examination, visual acuity was 20/30 in the right eye and 20/20 in left eye. Fundus examination OS was normal; OD demonstrated a flat, opaque, yellowish parapapillary choroidal lesion with grayish membrane associated with minimal subretinal fluid suggestive of a CNVM in the center. B-scan ultrasonography revealed findings consistent with a choroidal osteoma. Fundus fluorescein angiography of the right eye revealed a relatively well-defined area of hyperfluorescence that increased in size and intensity in the later phases suggestive of active extrafoveal CNVM. Optical coherence tomography confirmed the extrafoveal CNVM with subfoveal fluid. She was treated with intravitreal Bevacizumab OD. At the 2weeks visit, vision OD improved to 20/20. The FFA and OCT revealed a resolved CNVM. Intravitreal Bevacizumab may be an effective alternative in the management of CNVM secondary to choroidal osteoma

    Efficient Task Scheduling and Fair Load Distribution Among Federated Clouds

    Get PDF
    The federated cloud is the future generation of cloud computing, allowing sharing of computing and storage resources, and servicing of user tasks among cloud providers through a centralized control mechanism. However, a great challenge lies in the efficient management of such federated clouds and fair distribution of the load among heterogeneous cloud providers. In our proposed approach, called QPFS_MASG, at the federated cloud level, the incoming tasks queue are partitioned in order to achieve a fair distribution of the load among all cloud providers of the federated cloud. Then, at the cloud level, task scheduling using the Modified Activity Selection by Greedy (MASG) technique assigns the tasks to different virtual machines (VMs), considering the task deadline as the key factor in achieving good quality of service (QoS). The proposed approach takes care of servicing tasks within their deadline, reducing service level agreement (SLA) violations, improving the response time of user tasks as well as achieving fair distribution of the load among all participating cloud providers. The QPFS_MASG was implemented using CloudSim and the evaluation result revealed a guaranteed degree of fairness in service distribution among the cloud providers with reduced response time and SLA violations compared to existing approaches. Also, the evaluation results showed that the proposed approach serviced the user tasks with minimum number of VMs

    A complementary relation between classical bits and randomness in local part in simulating singlet state

    Full text link
    Recently Leggett's proposal of non-local model generates new interest in simulating the statistics of singlet state. Singlet state statistics can be simulated by 1 bit of classical communication without using any further nonlocal correlation. But, interestingly, singlet state statistics can also be simulated with no classical cost if a non-local box is used. In the first case, the output is completely unbiased whereas in second case outputs are completely random. We suggest a new (possibly) signaling correlation resource which successfully simulates singlet statistics and this result suggests a new complementary relation between required classical bits and randomness in local output when the classical communication is limited by 1 cbit. This result reproduces the above two models of simulation as extreme cases. This also explains why Leggett's non-local model and the model presented by Branciard et.al. should fail to reproduce the statistics of a singlet.Comment: v3: Typos corrected, few changed notations, some extensions to earlier write-u
    • …
    corecore