579 research outputs found

    Decoding X-ray observations from centres of galaxy clusters using MCMC

    Full text link
    We correct for the use of electron densities instead of total gas density in the pressure fits which were used to derive the local free-fall times (tff_{\rm ff}) in the original paper

    SVM Classifier on K-means Clustering Algorithm with Normalization in Data Mining for Prediction

    Get PDF
    This work is belonging to K-means clustering algorithms classifier is used with this algorithm to classified data and Min Max normalization technique also used is to enhance the results of this work over simply K- Means algorithm. K-means algorithm is a clustering algorithm and basically used for discovering the cluster within a dataset. Here cancer dataset is used for this research work and dataset is classified in two categories – Cancer and Non-Cancer, after execution of the implemented algorithm with SVM and Normalization technique. The initial point selection effects on the results of the algorithm, both in the number of clusters found and their centroids. In this work enhance the k-means clustering algorithm methods are discussed. This technique helps to improve efficiency, accuracy, performance and computational time. Some enhanced variations improve the efficiency and accuracy of algorithm. The main of all methods is to decrees the number of iterations which will less computational time. K-means algorithm in clustering is most popular technique which is widely used technique in data mining. Various enhancements done on K-mean are collected, so by using these enhancements one can build a new proposed algorithm which will be more efficient, accurate and less time consuming than the previous work. More focus of this studies is to decrease the number of iterations which is less time consuming and second one is to gain more accuracy using normalization technique overall belonging to improve time and accuracy than previous studies

    Study on the Crystal Structure and Microstructure Evolution of Shock-processed Titanium Powder

    Get PDF
    Titanium powder was rapidly solidified by using shock-wave consolidation technique. The critical parameters were controlled by intrumented detonics and pin-oscillography. The compacted specimens were investigated for crystal structure and microstructural strengthening by using standard diagnostic techniques. The density of the final product was found to be greater than 96% of the theoretical value. X-ray diffraction pattern reveals intact crystalline structure without the presence of any undesired phases. The particle size reduction indicated by XRD was supported by laser diffraction based particle size analyzer. Results from energy dispersive spectroscopy ruled out the possibility of any segregation within the compacts. Scanning electron microscopy showed crack-free, voids-free, melt-free, fracture-less compacts of titanium with a unidirectional dendrite orientation without any grain-growth

    Idiopathic aplastic anemia: a rare case report in Jammu and Kashmir region, India

    Get PDF
    Idiopathic aplastic anemia is a pancytopenia disorder that is a rare but life threatening for both mother and fetus during pregnancy. Association of aplastic anemia with pregnancy is unclear but considered to be interrelated. Bone marrow transplantation is the most effective treatment for adult aplastic anemia but is inadvisable to perform during pregnancy because of the teratogenic effect of immunosuppressive agents or radiation therapy to the growing fetus. Supportive care, withdrawal from offending drugs and involving erythrocytes and platelets transfusion is a promising way to save the life. Here author present a case report of 36-year-old lady with idiopathy aplastic anemia. In this case medical investigation revealed severe anemia of unknown origin. The patient was treated with hematinics, blood transfusion and glucocorticoids. A healthy baby was delivered without evidence of hemolysis at her eight month and one week of pregnancy, the patient recovered and discharged with normal incidence. Being a rare case, it becomes a necessity to report such life-threatening disorder and management. Moreover, to our knowledge this is the first case reported of its kind from Jammu and Kashmir Division of India

    Towards Configured Intrusion Detection Systems

    Get PDF
    This paper studies the challenges in the current intrusion detection system and comparatively analyzes the active and passive response systems. The paper studies the existing IDS and their usefulness in detecting and preventing attacks in any type of network and control traffic with the performance of the system to be improved. The study also evaluates the emerging avenues in Intrusion Detection System and explores the possible future avenues in intrusion detection scheme. It is observed that the detection-based systems have started to gain popularity in the IT security domain. The paper highlights the need to implement an appropriately configured IDS since an optimally configured IDS deters hackers, thus, reducing the need for investigation by security experts for security violations

    Use of Multimodal Biometric System for the Authentication and Security

    Get PDF
    We know that security is the main challenge of the modern era, there may be many techniques and methods used for providing the security of any system or data. The biometric system is the widely used method for security. The biometric security is more secure method then others like passwords, card etc. In biometric the part of the body with some uniqueness use as the input image. But now a day the use of single biometric is not more secure, so the alternative or solution of this problem is to use the Multimodal biometric system. In a multimodal system more than one biometric trait used for providing security and authentication to a system. The images are stored in the database by using different operations on the images for compare it by input images. There are some steps used in processing of multimodal biometric system like as ROI, feature extraction and matching

    BIOMETRIC AUTHENTICATION FOR PAYMENT TRANSACTIONS

    Get PDF
    The present disclosure relates to system and method of authenticating online payment transactions. The method includes receiving a payment transaction request from a mobile device 110. Upon receiving the payment transaction request, a digital payment system 120 transmits a request for user’s biometric data for performing biometric authentication. Upon receiving the user’s biometric data from the mobile device 110, the digital payment system 120 compares the received biometric data with the user’s biometric data stored in a memory. If the biometric data matches, the digital payment system 120 approves the transaction and a notification is sent to the mobile device. The proposed method may help visually impaired users to authenticate payment transactions using the biometric means. Further, the proposed method also helps to reduce fraudulent transactions

    Cell wall metabolite levels as a function of the growth phase in Staphylococcus aureus and library screening for synergistic combinations of FDA approved drugs against methicillin resistant S. aureus

    Get PDF
    Title from PDF of title page, viewed August 25, 2022Dissertation advisor: William GutheilVitaIncludes bibliographical references (pages 140-159)Dissertation (Ph.D)--Division of Pharmacology and Pharmaceutical Sciences, Department of Chemistry. University of Missouri--Kansas City, 2022Liquid chromatography-tandem mass spectrometry (LC-MS/MS) based methods for quantifying cell wall biosynthesis intermediates. These include LC-MS/MS methods for quantifying cytoplasmic UDP-linked peptidoglycan biosynthesis intermediates. Retention and separation of these polar intermediates on C18 media were significantly improved using N, N-dimethylhexylamine as an ion-pairing agent. We also have developed Marfey’s reagent-based LC-MS/MS methods to stereospecifically resolve D- and L- amino acids and the key D-alanine-D-alanine intermediate involved in CWB on a reverse-phase analytical column. In the first part of this study, we examined how CWB intermediates and energy-rich nucleotide (ATP, etc.) levels change over the whole growth curve of S. aureus, from senescence to logarithmic growth and back to senescence. We first extended our established ion-pairing agent-based LC-MS/MS method for detecting UDP-linked intermediates, including energy-rich nucleotides (ATP, etc.) (unpublished). In this study, a culture of Methicillin-resistant Staphylococcus aureus (MRSA) American Type Culture Collection (ATCC 43300) is grown to senescence for 48 hours in Muller Hinton (MH) broth. From senescence to the exponential phase, the levels of UDP-linked intermediates increase significantly, and the levels of energy-rich nucleotides are low during these phases of the growth curve. Hence, UDP-linked intermediates appear to be the high-priority biomolecules required for maintaining bacterial physiology, where nucleotides with high energy are rapidly assimilated by UDP-linked intermediates. Additionally, the accumulation of energy-rich nucleotides coincided with the decline in cell growth rates, suggesting a concomitant reduction in their utilization. Retention and separation of glucosamine-1-phosphate (GlcN-1-P) and glucosamine-6-phosphate (GlcN-6-P) on a reverse-phase column is not feasible due to their high polarity. The second part of this study tested and demonstrated several derivatization procedures to improve the retention of GlcN-1-P and GlcN-6-P on a reverse-phase column. Derivatization with isobutyric anhydride, hexanoic anhydride, octanoic anhydride, and decanoic anhydride combined with multichannel LC-MS/MS detection demonstrated resolution and quantification of these three analytes. MRSA, vancomycin-resistant enterococcus (VRE), and vancomycin-resistant enterococcus (VSE) extracts were prepared and derivatized in this study. The LC-MS/MS analysis of these samples demonstrated peaks of GlcN-1-P and alpha and beta anomers of GlcN-6-P that were clearly resolved on a reverse-phase analytical column. Therefore, we performed a high-throughput screening of FDA-approved compounds in the presence and absence of ceftobiprole, identifying intrinsically active agents and synergistic combinations with ceftobiprole. A checkerboard analysis was then performed on potential ceftobiprole synergistic agents. Strongly synergistic agents included β-lactamase resistant β-lactams (cloxacillin, dicloxacillin, flucloxacillin, oxacillin, nafcillin, and cefotaxime). There was also evidence of synergy between ceftobiprole and both meropenem and imipenem. Vancomycin, balofloxacin, and floxuridine showed weak synergy. A similar antagonistic effect of mupirocin on ceftobiprole was also observed in other studies showing that it led to β-lactam resistance. We also performed a high-throughput library screening of FDA-approved drugs in the presence and absence of floxuridine against MRSA with the aim of surveying the full scope of floxuridine antibacterial synergy. This study examined joint MIC determination of the FDA library hits in combination with floxuridine, a high-resolution method to depict the fractional inhibitory concentration of √2. This way, several strong synergistic compounds (FICmin ≤ 0.5) like imipenem and biapenem were identified. Moreover, many agents showed weak synergy (0.5 < FICmin ≤ 0.75), such as nafcillin, doripenem, meropenem, and moxalactam.Cell wall metabolite levels as a function of growth phase in S. aureus -- Perform LC-MS/MS-based method development and quantification of Glucosamine-1-Phosphate (GlcN-1-P) and Glucosamine 6-Phosphate (GlcN-6-P) which are involved in the early steps of cell wall biosynthesis -- Library screening for synergistic combinations of FDA-approved drugs with Ceftobiprole against Methicillin-resistant Staphylococcus Aureus -- A high-throughput library screening of FDA-approved drugs with Floxuridine against MRSA -- General conclusio

    A study of electrocardiogram changes in patients with acute stroke

    Get PDF
    Background: Electrocardiogram (ECG) changes are observed in patients with acute stroke and may create confusion with ECG changes found in cardiac disorders. The aim of the study was to study the ECG changes in patients with acute stroke who are not suffering from cardiac disorders which are known to show ECG changes.Methods: It was a prospective hospital observational based study conducted for a period of 1 year (20th July 2014 to 20thJuly 2015) including patients with acute stroke. Total 122 patients were enrolled and ECG changes were observed.Results: Various ECG changes are observed (Table 1) in present study including rhythm disturbances (like sinus tachycardia, sinus bradycardia, AF, VPc, RBBB, LBBB, etc.)  in 69 patients (56.6%) , bradycardia in 25 patients (19.5%), tachycardia 34 patients (28.1%), prolonged PR interval in 10 patients (9.2%), LAD in 32 patients (26.2%), RAD in 7 patients (5.7%), prolonged QRS interval in 31 patients (25.4%), LVH in 19 patients (15.6%), prolonged QTc interval in 53 patients (43.4%), p wave abnormalities in 30 patients (24.6%), pathological q wave in 11 patients (9.6%), ST segment elevation in 14 patients (11.4%), ST segment depression in 20 patients (16.4%), T wave inversion in 44 patients (36.1%) and presence of U wave in 9 patients (7.1%).Conclusions: QTc prolongation followed by T-wave inversion followed by ST segment changes were the most frequent ECG changes observed in patients with acute stroke. Various types of arrhythmias like sinus tachycardia, sinus bradycardia, AF, VPCs, BBB, Heart blocks, etc. were also among the common ECG findings. Furthermore ECG findings like PR interval prolongation, QRS interval prolongation and P-wave abnormalities (hardly any study is there in literature about these ECG findings) were additional findings in this study.

    A General Survey on Rushing Attack in MANETs

    Get PDF
    MANETs (Mobile Ad hoc Network) is a kind of network in which all the nodes are connected via wireless link. There is no fixed infrastructure because of which any node can join or leave the network at any point time. There is no central monitoring system. All the nodes are working as host as well as client at the same time. This makes the network vulnerable to different kind of attacks. Standard routing protocols are also not that secured to protect the network from all probable attacks. Attacker may attack the network and disrupt the network services abruptly. Some of the common attacks in MANETs are Rushing attack, Black hole attack, Sybil attack, Neighbor attack and Jellyfish attack etc. In this paper we are trying to accumulate different probabilities of getting rushing attack in MANETs. And also discuss about different counter measures to prevent as well as to detect rushing attack.Keywords:Rushing attack, MANETs, Security, Denial of Service (DoS), Security threat
    corecore