94 research outputs found
A Survey Paper on Privacy Preserving and Content Protecting Location Based Queries Using Two Phase Protocol
Location Based Service LBS is the service accessed on mobiles or devices with GPS. In order to use these services there are certain issues to the data being shared and the information of the user who is using this service may be exposed publicly, even though the user doesnot want to share his information in public domain. A lot of research has been done over this, to protect the users data to be accessed by unauthorised users and those who are not the intended users of that information. We propose a solution to one of the location-based query problems. A user wants to query a database of location data, known as Points of Interest (POIs), and does not want to reveal his/her location to the server due to privacy concerns; And the owner of the location data, that is, the location server, does not want to simply distribute its data to all users
Mathematical study of the mean communication distances at lognormal shadow fading and Nakagami fading
Over some few decades, the communication distance and connectivity at wireless sensor network (WSN) has got noticeable attention from the researchers. In general, the communication process in WSN ad-hoc occurs without some wired infrastructure and, the communication process done through a ‘single-hop’ transmission, where the intermediate nodes called as relay nodes are used in long distance communication and the nodes are capable to transmit and receive the data packets. In this paper, we presented a computational analysis of communication distance in WSN in the presence of fading effects such as nakagami-m fading and lognormal fading. An extensive investigation at both nakagami-m fading and lognormal fading is carried out to provide optimize communication in ad-hoc WSN. In addition, individual wireless nodes have the similar range of communication, is assumed to get the precise communication distance and coverage area in a WSN, where it is required to get mean communication distance. In result analysis section, several validation parameters such as transmitted power, attenuation constant and different number of fading factor is considered to provide proper analytical view.
Effect of endometrial scratch injury on pregnancy rate after previously failed intrauterine insemination
Background: Endometrial receptivity plays an important role in implantation and successful pregnancy. In literature, various attempts have been made to improve endometrial receptivity. Endometrial scratch injury (ESI) is one such intervention widely offered to improve endometrial receptivity in women with a history of in-vitro-fertilization (IVF) failure. In our present study, this procedure of ESI was performed in cases with previously failed intrauterine insemination (IUI) and its effect on pregnancy rate was assessed.
Methods: A prospective, randomised, controlled study was conducted at Fertility Clinic, Bhabha Atomic Research Centre Hospital, Mumbai. Total 200 women requiring IUI with previously failed one IUI were included in the study. They were randomly divided into 2 groups of 100 each. Both the groups underwent controlled ovarian stimulation with clomiphene citrate and gonadotropins followed by IUI. Study group underwent “endometrial scratching” in mid-proliferative phase of the same cycle preceding IUI. Control group underwent IUI alone. Pregnancy rates (clinical and ongoing) were compared in both the groups.
Results: Endometrial scratching group had significantly higher (<0.0002) (8.4±2.3 mm versus 7.3±1.9 mm) endometrial thickness at the time of ovulation trigger. Clinical pregnancy rate was significantly higher (p<0.0001) (42% versus 16%) in endometrial scratching group with no significant difference in ectopic pregnancy, miscarriage and multiple pregnancy rates in both the groups.
Conclusions: Due to its role in improving pregnancy rates in women with previously failed IUI, clinicians should offer ESI in mid-proliferative phase of the same cycle preceding IUI, before offering advanced IVF treatment
Implementation of Decoy Deception based Detection System for Ransomware Attack
Ransomware poses a dangerous threat to cybersecurity. Data as well as rights owned by the user are adversely impacted. The situation has become considerably more critical as a result of the emergence of new ransomware varieties and Ransomware-as-a-Service. In this paper, we presented a novel deception-based and behaviour-based method for real-time ransomware detection. In order to avoid any loss before ransomware is discovered, we build pretend files and directories for nefarious behaviours. We conducted a pilot study using Locky, and the results demonstrate the effectiveness of our strategy with little system resource usage and geographical cost. 
Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality
The paper proposes a role-based secure data access control framework for cost-optimized cloud storage, addressing the challenge of maintaining data security, privacy, integrity, and availability at lower cost. The proposed framework incorporates a secure authenticity scheme to protect data during storage or transfer over the cloud. The framework leverages storage cost optimization by compressing high-resolution images and fragmenting them into multiple encrypted chunks using the owner's private key. The proposed approach offers two layers of security, ensuring that only authorized users can decrypt and reconstruct data into its original format. The implementation results depicts that the proposed scheme outperforms existing systems in various aspects, making it a reliable solution for cloud service providers to enhance data security while reducing storage costs
Editorial: Recent trends and spotlight on nucleotide-based drugs: novel targets, their design, delivery, and clinical potential
Treatment of varicose ulcers using unified strategy - a case report
Introduction: Varicose ulcers are lesions that develop as a result of improper venous valve function, commonly in the lower limbs. A weakened venous valve prevents blood from flowing backward, which increases vein pressure, which in turn causes hypertension and venous ulcers. Clinical finding: They mainly occur throughout the distal medial leg, which is frequently excruciatingly awful, prone to bleeding, susceptible to infection. Diagnosis: This ailment is known as Dushta Vrana(infectious or chronic wound) in Ayurved. Interventions: With the particular Shodhana therapy(purification), it is manageable. To treat the instance presented here, Shigru Churna (Moringa oleifera powder) 4000mg orally, Shigru Kwath Avagah Sweda (submerge leg in warm Moringa oleifera decoction), and Jalauka Avacharan (leech application) were used.Outcome: After 28 days of satisfactory treatment, the wound was thoroughly discussed. Conclusion: The oral administration of Shigru Churna and Avagah Sweda of Shigru Churna Kwatha and Jalaukavacharan effective in management of non-healing varicose ulcer
AYURVEDA-BASED PARIKARTIKA MANAGEMENT WSR FISSURE IN ANO: A CASE REPORT
Introduction: Fissure in ano, or Parikartika in Ayurveda, is a painful anorectal condition. A key feature of this case is the use of Shatadhauta Gruta (medicated ghee) washed with Nirgundi Kashay instead of water. Clinical findings: The patient presented with a burning sensation, severe pain in anal region during and after bowel movements, and blood-stained stools. Diagnosis: Clinical examination confirmed an acute fissure-in-Ano a longitudinal ulcer at the 6 o\u27clock position. Interventions: Treatment included both external and internal Ayurvedic interventions: warm sitz baths followed by the application of nirguNDI patra kaShAya Sodhit Shatadhaut GRuta (NPKSSG) externally, along with herbal formulations for internal balance. Outcome: Remarkable improvement was observed within 12 days, with no recurrence at 3 and 6 months. Conclusion: NPKSSG proved to be an effective treatment for Parikartika, demonstrating properties like pain relief, wound cleansing, and healing. Its unique formulation enhances its efficacy in managing fissure in Ano effectivel
Recommended from our members
Fluidically Driven Systems for Tangible and Interactive Media
The possibility of augmenting existing 3D-interaction devices for virtual reality with haptic feedback has generated wide interest in the field of human-computer Interaction. Designing interaction devices for haptic feedback is challenging due to the densely packed mechanoreceptors on the skin distributed over a large surface area. The widely used solution for the design of haptic interfaces rely on solid-state electronic components such as piezoelectric actuators, voice coils, vibrotactile actuators, or electromagnets that are built with rigid materials. Integrating these electronic components with textiles to match the spatial density of the mechanoreceptors on the skin can cause discomfort. Additionally, the rigid nature of these devices can limit them from conforming to the complex topological surfaces of the human body. The emerging field of soft robotics has the potential to address these challenges by replacing traditional actuators with unconventional materials that have mechanical properties close to those of human tissue. Various actuation strategies in soft robotics (including pneumatic, hydraulic, thermal, and electromechanical actuation) have been previously presented for applications in haptic devices. Fluidic systems have been widely explored in haptics due to their ability to enable actuators with ease of use. However, most fluidic systems control these actuators with individually addressable electromechanical valves, which make the system difficult to scale in number, to achieve the spatial density desired for haptic interfaces. Additionally, the nonlinear nature of elastomeric devices makes the stable, closed-loop control of such systems very complex. In this dissertation, I describe strategies to simplify the design and control of fluidically actuated systems to enable their application to wearable haptic interfaces and interactive media. First, I present the concept of "Fiber Jamming'', a mechanism to achieve variable stiffness by controlling the input pressure in an actuator. I demonstrate the application of fiber jamming using open-loop control in a variable-stiffness haptic glove and a reconfigurable truss structure. Next, I present a dot-matrix-inspired fluidic circuit to individually address actuators in a large array. I demonstrate the application of the fluidic circuit using 10 electromechanical valves to individually address a 2D-Shape Display with 25 actuators. Additionally, I also demonstrate the application of the fluidic circuit to actuate a haptic vest with an array of inflatable pouches. Finally, I present strategies for the design and evaluation of 3D designs to overcome the limitations of the existing 3D-input devices to facilitate tasks requiring precision. I present a tool for three interactions in three dimensions for the design and prototyping of structures in engineering applications. The first two techniques demonstrate how the design and control of fluidic systems can be simplified without compromising their rapid rates of actuation and ease of use. The 3D-interface design and evaluation strategies present techniques to design and evaluate VR applications to enable precision tasks. Overall, the results demonstrate strategies for realizing ubiquitous tangible interfaces for applications in wearable haptic interfaces and exoskeletons
- …
