1,194 research outputs found

    Nonintegrability of (2+1)-dimensional continuum isotropic Heisenberg spin system: Painlev\'e analysis

    Get PDF
    While many integrable spin systems are known to exist in (1+1) and (2+1) dimensions, the integrability property of the physically important (2+1) dimensional isotropic Heisenberg ferromagnetic spin system in the continuum limit has not been investigated in the literature. In this paper, we show through a careful singularity structure analysis of the underlying nonlinear evolution equation that the system admits logarithmic type singular manifolds and so is of non-Painlev\'e type and is expected to be nonintegrable.Comment: 11 pages. to be published in Phys. Lett. A (2006

    Inflammatory biomarkers and its value in predicting survival and outcome among patients with spontaneous intracerebral haemorrhage

    Get PDF
    Background Spontaneous IntraCerebral Hemorrhage (SICH) has emerged as one of the most devastating forms of stroke in recent decades. This disease is noted to carry a 30 day mortality rate of approximately 45%. An increasing number of studies have implicated a complex immune-mediated and inflammation mediated cascade of responses in the pathophysiology of SICH and the resultant neurologic outcome. Several clinical studies have demonstrated an association between inflammatory markers and outcome in patients with SICH. However, the exact relationship between serum biomarkers and functional outcomes amongst survivors has not been clearly elucidated . This study aims at providing a promising perspective and to evaluate the changes in peripheral leukocyte count (WBC count) and C-Reactive Protein (CRP) level in patients with SICH and to correlate these findings with survival and functional outcome, thus to to support and substantiate existing evidences. Methodology A prospective, descriptive and correlational study was conducted in Hospital Umum Sarawak (HUS) over the span of 2 years ( April 2013 till April 2015) . Patients with supratentorial intracerebral bleed secondary to uncontrolled hypertension, aged between 30-75 years were recruited in this study . Data pertaining to the demography ( age, gender, BP, GCS score, and co-morbidities) , clinical and radiological parameters ( site of lesion and the volume of the clot ) were collected on admission. Blood samples were taken to measure peripheral WBC count and CRP level on admission and at 72 hours of admission. Mortality and functional outcomes were determined at 6 months post ictus. Patients were recruited following fulfillment of exclusion and inclusion criteria and all obtained data was analyzed with Statistical Package for Social Sciences (SPSS) for Windows version 21.0. Results A total of 60 patients were recruited in this study. We found about 16 patients were less than or equal to 50 years old (26.7%) and 44 patients belong to the older age group of above 50 years (73.3%). Majority of patients presented with GCS score of 9/15 to 11/15 with a total of 13 patients (21.7%) in each group of 9/15, 10/15 and 11/15. The least number of patients encountered belonged to the GCS score of 14/15 – a total of 5 patients (8.3%). GCS score on admission was noted to be significantly related to 6 month functional outcome or Glasgow Outcome Scale (GOS) and overall mortality or survival (p0.05). WBC count and CRP level on admission and at 72 hours of admission noted to have relationship with overall 6 months GOS or functionality and also with overall survival (p<0.05). Total number of patients belonging to the better Glasgow Outcome Score (GOS) group (GOS 4-5) was found to comprise 20 patients (33.3%) and about 27 patients (45%) belonged to the poor GOS group (GOS 2-3) . About 13 patients (21.7%) succumbed to the disease (GOS 1). Conclusion We could conclude that via this study, it was evident that in patients with SICH, the main determinants or predictors of functional outcome at 6 months and overall survival were noted to be GCS score on admission, clot size, WBC count and CRP levels on admission and at 72 hours of admission

    Secure Credits for Micro Payments Scheme using Encrypted Techniques

    Get PDF
    Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer date by targeting the point of scale (PoS) system. Increasing malware that ca steal card data as soon they are read by the device details. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disabling automatically by erasable PUFs. It includes that limited activity as server to client transaction is sure. Attackers often aim at staling such customer data by targeting the Point of scale (for sort, PoS) system. I.e. the point at which retailer first acquires customer data. Modern PoS system is powerful computer equipped with card reader and running specialized software. Increasingly often, user device are leveraged as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished .As such as, in case where customer and vendor are persistently or intermittently disconnected from the net work, no secure on-line payment is possible. This work describes SPEF, over up to date approaches I term of flexibility and security. To the best of our knowledge SPEF is the first solution that provide secure fully off line payment while being resilient to all currently known Pops breaches. In particular details SPEF architecture components and protocols .Further a thorough analysis of SPEF functional security properties is provider showing its effectiveness and visibility

    Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) have established the connection to source and destination. For example this often faces disconnection and unreliable wireless connections. A delay tolerant network (DTNs) provides a network imposes disruption or delay. The delay tolerant networks operate in limited resources such as memory size, central processing unit. Trust management protocol uses a dynamic threshold updating which overcomes the problems .The dynamic threshold update reduces the false detection probability of the malicious nodes. The system proposes a secure routing management schemes to adopt information security principles successfully. It analyzes the basic security principles and operations for trust authentication which is applicable in delay tolerant networks (DTNs).For security the proposed system identifies the store and forward approach in network communications and analyzes the routing in cases like selfish contact and collaboration contact methods. The proposed method identifies ZRP protocol scheme and it enhances the scheme using methods namely distributed operation, mobility, delay analysis, security association and trust modules. This security scheme analyzes the performance analysis and proposed algorithm based on parameter time, authentication, security, and secure routing. From this analysis, this research work identifies the issues in DTNs secure routing and enhances ZRP (Zone Routing Protocol) by suggesting an authentication principle as a noted security principle for extremely information security concepts

    INVESTIGATION ON START-UP CHARACTERISTICS OF CRYOGENIC HEAT PIPES

    Get PDF
    ABSTRACT Heat pipe is a device which transfers heat from one location to another with a small temperature gradient. Application includes use of cryogenic heat pipe in cooling infrared sensors, laser systems, cryocoolers, thermal control large superconducting magnets and tumor surgery. This paper deals with transient behavior of cryogenic heat pipes with wire mesh and axial grooved wick using nitrogen and oxygen as working fluid. A special liquid nitrogen cryostat has been designed and developed for evaluating the transient behavior of heat pipes at 77 K when the condenser portion is connected to the cold sink externally. In this study, the start-up characteristic of heat pipes is experimentally investigated. Keywords: cryogenic heat pipe, start up behavior. INTRODUCTION A heat pipe is a self-contained structure, which achieves very high thermal conductance by means of capillary circulation. It utilizes the latent heat of the vaporized working fluid for transfer of heat. As a result, the effective thermal conductivity is several orders of magnitudes higher than that of the good solid conductors. As illustrated i

    Simulation of Flapping-wing Unmanned Aerial Vehicle using X-plane and Matlab/Simulink

    Get PDF
    This paper presents the simulation of flapping-wing unmanned aerial vehicle model using X-plane and Matlab/ Simulink. The flapping-wing ornithopter model (i.e. an aircraft that flies by flapping its wings) has been developed in plane maker software and executed in the X-plane environment. The key idea of flapping-wing mechanism in X-plane software is by varying its dihedral angle sinusoidally. This sinusoidally varying dihedral angle of wing creates upward and downward stroke moments inturn this creates a lift and a forward thrust for flying the flapping-wing model. Here pitch, roll, yaw and throttle (flapping rate) is fed as reference input through the user datagram protocol (UDP) port. The difference between the reference inputs, the simulated outputs are again fed back to simulator through UDP port and the gains are observed for the responses of flapping-wing unmanned aerial vehicle in Matlab/Simulink environment. Here various gains are used to monitor the optimized flying of flapping-wing model.Defence Science Journal, Vol. 64, No. 4, July 2014, pp.327-331, DOI:http://dx.doi.org/10.14429/dsj.64.493

    Secure Credits for Micro Payments Scheme using Encrypted Techniques

    Get PDF
    Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer date by targeting the point of scale (PoS) system. Increasing malware that ca steal card data as soon they are read by the device details. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disabling automatically by erasable PUFs. It includes that limited activity as server to client transaction is sure. Attackers often aim at staling such customer data by targeting the Point of scale (for sort, PoS) system. I.e. the point at which retailer first acquires customer data. Modern PoS system is powerful computer equipped with card reader and running specialized software. Increasingly often, user device are leveraged as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished .As such as, in case where customer and vendor are persistently or intermittently disconnected from the net work, no secure on-line payment is possible. This work describes SPEF, over up to date approaches I term of flexibility and security. To the best of our knowledge SPEF is the first solution that provide secure fully off line payment while being resilient to all currently known Pops breaches. In particular details SPEF architecture components and protocols .Further a thorough analysis of SPEF functional security properties is provider showing its effectiveness and visibility

    A Study on the Scope and Problems of Marketing Medical Insurance in Chennai Metropolitan

    Get PDF
    We see that India, world second biggest populated country which has reported as fast developing country with its liberalized industrial policy. There is an observation that more than three fourth of the public spend more towards their health care from their pockets. The Chennai metropolitan city with 4.7 million populations has its own health care issues. The objective of the current work is to recognize the reach of medical insurance concept among the buyers of the Chennai metropolitan, and the influencing variables of buyers’ purchase decision of medical insurance. The work showing the new sculpt of buyer purchase decision in medical insurance. They are: individual, organizational and societal, representing the buyer, seller and the business environment. It uses survey method using structured questionnaire and data is collected from 120 samples from three parliamentary constituencies. Key words: Medical Insurance, Consumer behavior, Marketin

    An Analysis of DDoS Attack Detection and Mitigation Using Machine Learning System

    Get PDF
    Nowadays, many companies and/or governments require a secure system and/or an accurate intrusion detection system (IDS) to defend their system service and the user’s private information. In network security, developing an accurate discovery system for distributed denial of service (DDos) attacks is one of challenging tasks. DDos attacks jam the network service of the target using multiple bots hijacked by crackers and send frequent packets to the target server. Servers of many companies and/or governments have been victims of the attacks. In such a command by multiple bots from another network and then leave the bots quickly after command execute. The proposed strategy is to develop an intelligent detection system for DDos attacks by detecting patterns of DDos attacks using system packet analysis and exploiting machine learning techniques to study the patterns of DDos attacks. In this study, we analysed large numbers of network packets provided by the Center for applied internet data analysis and Applied the detection system using an Ad-hoc On-demand distance Vector (AODV) and Adaptive information dissemination (AID) protocols. The discovery system is accurate in detecting DDos
    corecore