161 research outputs found

    Estimation Of Hct Levels in Tobacco Smokers, Non - Tobacco Smokers, Raw Tobacco Chewers and Its Effects -A Study

    Get PDF
    Aim & Objective: The aim of the study was to to compare and correlate with HCT values levels in blood in all the groups i.e.., smokers, Raw tobacco chewers, passive smokers, controls. Methodology: The Methodology followed for preparing this work is mostly the primary and secondary data. The primary data for the study are collected through OPD Department of TRR Medical College and hospital and Camp patients. We have taken Mission Hb [Haemoglobin Testing system] Meter Instrument was used to estimate Hb and HCT values in patient blood, with a Pricking Finger method free flow blood was collected in a graduated capillary tube and gently blood was transferred on the Hb strip and the reading was noticed and documented. Results: when we compare the study subjects there was a increase in HCT Levels in the smokers and raw tobacco chewers when compared with passive smokers and healthy controls. Conclusion: In this study HCT level of all study subjected.e.,. comparison of HCT % levels between different study subject groups has gradually increased from control vs passive smoker’s vs raw tobacco chewer and higher in smokers showed significant P-Value have showed positive correlation as per annova test. As per our study done with per multiple comparison of hb% levels comparison between different study subject groups by post hoc test –bonferroni method analysis results were mixed and showed significant values

    An 18 mer sequence in a rat 1.3 kbp EcoRI repeat detects genetic polymorphism in humans

    Get PDF
    DNA fingerprinting involves the typing of an individual's DNA content to produce somatically stable,individual-specific DNA fingerprints. This technique often uses hypervariable minisatellite (HVMS) sequences as the fingerprinting probe and has found extensive use in several disciplines. Recently, we sequenced a 1.3 kbp EcoRI repetitive DNA fragment, shown to harbour the meiotic DNA repair site(s) of rat pachytene spermatocytes. This 1.3 kbp clone contained four sequences sharing high homology to the various HVMS sequences reported in the literature. Here we show that one of the sequences can indeed detect polymorphism in human individuals and can be used for DNA fingerprinting

    An enhanced AES-GCM based security protocol for securing the IoT communication

    Get PDF
    In the recent years, the devices in Internet of Things (IoT) are growing exponentially due to the emergence of many sophisticated applications. This tremendous growth leads to serious security challenges and the devices of Wireless Sensor Networks should be protected from various attacks. IoT can be configured dynamically without fixed infrastructure and the devices are communicated with one another in an Ad-hoc manner. The work presents the classification of various DDoS attacks in the IoT environment and provides a solution for replay attack. All variations of DDoS attacks are modeled using UML based activity modeling. This clearly understands the behavior of each version of attacks and their performance in the environment. The modeling also helps to construct a solution to prevent this attack from its execution. The work also proposed a trust based protocol for replay attacks which allows the attack inside the network and blocks it after identifying the attack based on its specific behavior. The network performance is improved after implementing this proposed protocol inside the network with help of simulation under realistic conditions. The performance metrics considered in the work are energy, packet loss, computational time and throughput. The paper compares the performance with the state-of-the-art schemes such as Efficient Distributed Deterministic Key and Hashbased Message Authentication Code. The experimental analysis proved that the proposed scheme outperforms the other state-of-the-works in terms of computational cost, throughput, and delay

    Blind Assistance System using Image Processing

    Get PDF
    Eye diseases usually cause blindness and visual impairment As per the statistics there are over 285 million visually impaired people living worldwide They come across many troubles in their daily life especially while navigating from one place to another on their own They often depend on others for help to satisfy their day-to-day needs So it is quite a challenging task to implement a technological solution to assist them Several technologies were developed for the assistance of visually impaired people One such attempt is that we would wish to make an Integrated Machine Learning System that allows the blind victims to identify and classify real-time objects generating voice feedback and distance Which also produces warnings whether they are very close or far away from the thin

    Gender Research Methodologies for Agricultural Research in India: Summary and Recommendations of a Workshop 27-28 May 1996

    Get PDF
    ICRISAT is concerned about the implications of technological changes in agriculture for the welfare of women. A 2-day informal workshop on methodologies for gender research was held on 27 and 28 May, 1996, at ICRISAT Asia Center. The primary objectives of the workshop were to refine the Institute's gender research methodologies and to initiate the development of a strategy for mainstreaming gender analysis in technology development at ICRISAT. Specifically, the workshop was intended to identify gender-related differences in preferences for varieties and technologies that may constrain technology adoption; identify a set of key indicators to measure the intrahousehold distribution of welfare gains from the adoption of given technologies; and identify simple, accurate, and quick methods for data collection. The workshop was attended by participants from research and training institutions and nongovernmental organizations in addition to ICRISAT scientists. This document contains a synthesis of discussions that took place, and the summaries of presentations made by participants. Specific recommendations on developing a strategy for mainstreaming gender are included in the synthesis

    Resource Management in Fog Networking of Cloud Computing using KNN Algorithm

    Get PDF
    It is necessary to deploy any application in Cloud environment to reduce the investment cost, maintenance cost and licence of hardware/software. Keeping these benefits, it is advised to go for cloud computing environment for any application deployment. The major challenge in this environment is fault tolerance of resources to support for continuous availability of resources to client for working. Especially in IoT applications, we use Fog networking connecting to cloud computing. In this scenario, it is advised to use KNN (K- Nearest Neighbour) resource identification and allocation algorithm to increase the throughput to user requirement. We are presenting an approach to allocate the required resources with optimal distance resource allocation, so as to improve the throughput of user requirement

    Fertility problems in women with polycystic ovary syndrome

    Get PDF
    Background: PCOS (Poly Cystic Ovary Syndrome) is the most common endocrine disorder in women of reproductive age with high prevalence. It is a leading cause of infertility in women; this draws an attention to this issue. In this study we aimed to know the prevalence, clinical features, fertility problems and management of PCOS.  Methods: In this prospective observational study, women who consulted Obstetrics & Gynaecology department were screened to identify the PCOS problems through clinical histories, PCOS questionnaire and ultrasonography over a period of 6 months at Rajiv Gandhi institute of medical sciences (RIMS) in Kadapa, India. Patients diagnosed with PCOS were assessed for their clinical manifestations, severity, life style and treatment given, and were educated accordingly through patient counselling and leaflets.Results: We observed 6.39 % prevalence out of 970 women. 59 (95.1%) patients were complained irregular menstrual cycles. Infertility was significantly high in PCOS women i.e. 13.35%. 64.4% of PCOS patients had miscarriages.Conclusions: PCOS is a complex condition with high prevalence of fertility problems, needing due attention. There is need to create attentiveness towards this issue. Early diagnosis and proper management with appropriate medicines and lifestyle modifications will improve the condition and prevents complications.

    Torus knots and mirror symmetry

    Full text link
    We propose a spectral curve describing torus knots and links in the B-model. In particular, the application of the topological recursion to this curve generates all their colored HOMFLY invariants. The curve is obtained by exploiting the full Sl(2, Z) symmetry of the spectral curve of the resolved conifold, and should be regarded as the mirror of the topological D-brane associated to torus knots in the large N Gopakumar-Vafa duality. Moreover, we derive the curve as the large N limit of the matrix model computing torus knot invariants.Comment: 30 pages + appendix, 3 figure
    • …
    corecore