540 research outputs found
A solitary giant cell tumor of the tendon sheath of left third finger in a 23-year-old man: a case report
Giant cell tumor of the tendon sheath (GCTTS) is a common condition usually encountered in middle aged men, usually seen on the thumb, index, middle fingers. These benign tumors are known to reoccur. Re-occurrence can be attributed to poor surgical technique, excision of the tumor in toto is considered difficult given the close proximity of the digital nerves, blood vessels, tendons to the tumor. A magnifying loop is usually used in these cases to identify and resect the satellite lesions. In this case report, we are presenting a case of solitary GCTTS of the tendon sheath in a 23-year-old man with history of gradually progressive painless swelling over his left third finger. Musculo-skeletal ultrasound revealed a heterogeneously hypo-echoic well-defined lesion over the ventral aspect of the left third finger. Histopathology showed giant cell morphology. Patient underwent exploration, tumor excision in toto with primary suturing in our institute with an uneventful postoperative period. No loss of range of movements of the PIP, DIP joints was noted in the postoperative period. Good dissection with excision of the tumor in toto gives better outcomes
SECURE DEPENDABLE SELECTIVE STORAGE SERVICES AND SUPPORT FOR DYNAMIC DATA OPERATIONS IN CLOUD COMPUTING
Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data
LOCC distinguishability of unilaterally transformable quantum states
We consider the question of perfect local distinguishability of mutually
orthogonal bipartite quantum states, with the property that every state can be
specified by a unitary operator acting on the local Hilbert space of Bob. We
show that if the states can be exactly discriminated by one-way LOCC where
Alice goes first, then the unitary operators can also be perfectly
distinguished by an orthogonal measurement on Bob's Hilbert space. We give
examples of sets of N<=d maximally entangled states in for
d=4,5,6 that are not perfectly distinguishable by one-way LOCC. Interestingly
for d=5,6 our examples consist of four and five states respectively. We
conjecture that these states cannot be perfectly discriminated by two-way LOCC.Comment: Revised version, new proofs added; to appear in New Journal of
Physic
Choroidal osteoma with CNVM – Successful treatment with intravitreal Bevacizumab
AbstractTwenty-seven years old healthy woman presented with complaints of sudden painless blurred vision in right eye for 1week. On examination, visual acuity was 20/30 in the right eye and 20/20 in left eye. Fundus examination OS was normal; OD demonstrated a flat, opaque, yellowish parapapillary choroidal lesion with grayish membrane associated with minimal subretinal fluid suggestive of a CNVM in the center. B-scan ultrasonography revealed findings consistent with a choroidal osteoma. Fundus fluorescein angiography of the right eye revealed a relatively well-defined area of hyperfluorescence that increased in size and intensity in the later phases suggestive of active extrafoveal CNVM. Optical coherence tomography confirmed the extrafoveal CNVM with subfoveal fluid. She was treated with intravitreal Bevacizumab OD. At the 2weeks visit, vision OD improved to 20/20. The FFA and OCT revealed a resolved CNVM. Intravitreal Bevacizumab may be an effective alternative in the management of CNVM secondary to choroidal osteoma
Efficient Task Scheduling and Fair Load Distribution Among Federated Clouds
The federated cloud is the future generation of cloud computing, allowing sharing of computing and storage resources, and servicing of user tasks among cloud providers through a centralized control mechanism. However, a great challenge lies in the efficient management of such federated clouds and fair distribution of the load among heterogeneous cloud providers. In our proposed approach, called QPFS_MASG, at the federated cloud level, the incoming tasks queue are partitioned in order to achieve a fair distribution of the load among all cloud providers of the federated cloud. Then, at the cloud level, task scheduling using the Modified Activity Selection by Greedy (MASG) technique assigns the tasks to different virtual machines (VMs), considering the task deadline as the key factor in achieving good quality of service (QoS). The proposed approach takes care of servicing tasks within their deadline, reducing service level agreement (SLA) violations, improving the response time of user tasks as well as achieving fair distribution of the load among all participating cloud providers. The QPFS_MASG was implemented using CloudSim and the evaluation result revealed a guaranteed degree of fairness in service distribution among the cloud providers with reduced response time and SLA violations compared to existing approaches. Also, the evaluation results showed that the proposed approach serviced the user tasks with minimum number of VMs
A complementary relation between classical bits and randomness in local part in simulating singlet state
Recently Leggett's proposal of non-local model generates new interest in
simulating the statistics of singlet state. Singlet state statistics can be
simulated by 1 bit of classical communication without using any further
nonlocal correlation. But, interestingly, singlet state statistics can also be
simulated with no classical cost if a non-local box is used. In the first case,
the output is completely unbiased whereas in second case outputs are completely
random. We suggest a new (possibly) signaling correlation resource which
successfully simulates singlet statistics and this result suggests a new
complementary relation between required classical bits and randomness in local
output when the classical communication is limited by 1 cbit. This result
reproduces the above two models of simulation as extreme cases. This also
explains why Leggett's non-local model and the model presented by Branciard
et.al. should fail to reproduce the statistics of a singlet.Comment: v3: Typos corrected, few changed notations, some extensions to
earlier write-u
- …