1,422 research outputs found

    Local anesthetic agents along with hyaluronidase for inguinal hernia block provides excellent analgesia: a double blind study

    Get PDF
    Background: Inguinal hernia block is cost effective, but fear of intra-operative pain may hinder its widespread use. It is unknown whether hyaluronidase along with local anesthetic agent provides good analgesia for hernia block. The aim was to evaluate the effectiveness of hyaluronidase along with local anesthetic agents for inguinal hernia block in patients undergoing inguinal hernioplasty.Methods: 50 patients ASA grade I and II, age above 18 years, undergoing inguinal hernioplasty were randomized into two groups. Group A received inguinal hernia block with local anesthetic agents without hyaluronidase and Group B received inguinal hernia block with hyaluronidase and local anesthetic agents. Both groups received premedication 10 minutes before induction in the form of inj. Fentanyl, Midazolam, Ranitidine and OndansetronResults: In Group B, out of 25 patients only 4 patients required intraoperative analgesia while in group A 16 patients required intraoperative analgesia. Post operative pain was assessed for 24 hours using the pain rating scale. The mean duration of analgesia was significantly longer in group B (16.16±6.8780 hrs) compared to group A (7.32±2.5285 hrs); pain score was compared between the two groups. Group B had lower pain scores than group A which was statistically significant (P<0.05).Conclusion: It concludes that hyaluronidase with local anesthetic agent for inguinal hernia block provides excellent intraoperative analgesia and also prolongs the post operative analgesia

    Electronic states of PrCoO3_3: X-ray photoemission spectroscopy and LDA+U density of states studies

    Full text link
    Electronic states of PrCoO3_3 are studied using x-ray photoemission spectroscopy. Pr 3d5/2_{5/2} core level and valence band (VB) were recorded using Mg Kβ_\beta source. The core level spectrum shows that the 3d5/2_{5/2} level is split into two components of multiplicity 4 and 2, respectively due to coupling of the spin states of the hole in 3d5/2_{5/2} with Pr 4f holes spin state. The observed splitting is 4.5 eV. The VB spectrum is interpreted using density of states (DOS) calculations under LDA and LDA+U. It is noted that LDA is not sufficient to explain the observed VB spectrum. Inclusion of on-site Coulomb correlation for Co 3d electrons in LDA+U calculations gives DOS which is useful in qualitative explanation of the ground state. However, it is necessary to include interactions between Pr 4f electrons to get better agreement with experimental VB spectrum. It is seen that the VB consists of Pr 4f, Co 3d and O 2p states. Pr 4f, Co 3d and O 2p bands are highly mixed indicating strong hybridization of these three states. The band near the Fermi level has about equal contributions from Pr 4f and O 2p states with somewhat smaller contribution from Co 3d states. Thus in the Zaanen, Sawatzky, and Allen scheme PrCoO3_3 can be considered as charge transfer insulator. The charge transfer energy Δ\Delta can be obtained using LDA DOS calculations and the Coulomb-exchange energy U' from LDA+U. The explicit values for PrCoO3_3 are Δ\Delta = 3.9 eV and U' = 5.5 eV; the crystal field splitting and 3d bandwidth of Co ions are also found to be 2.8 and 1.8 eV, respectively.Comment: 12 pages, 7 figures; to appear J. Phys.: Condens. Matte

    Reaction engineering of emerging oxidation processes

    Get PDF
    A review of the recent developments in emerging multiphase catalytic oxidation processes for the manufacture of various key chemicals, and an overview of reaction engineering principles needed for reactor design and interpretation of performance are presented. The utility of combining a knowledge of the catalytic chemistry through fundamental mechanisms and kinetics with transport effects and hydrodynamics using recent advances in experimental methods is also discussed and reviewed with reference to liquid phase oxidation

    Design and Implementation of Parallel FIR Filter Using High Speed Vedic Multiplier

    Get PDF
    The demand for high speed processing has been increasing as a result of expanding computer and signal processing applications. Higher throughput arithmetic operations are important to achieve the desired performance in many signal processing and image processing applications. One of the key arithmetic operations in such applications is multiplication which determines the performance of the entire system. Thus the optimization of the multiplier speed and area is a challenge for many processors. This challenge has been successfully overcome by the use of ancient Vedic multiplier. This paper illustrates design and implementation of parallel Finite Impulse Response (FIR) filters using Vedic mathematics based Urdhva Tiryabhyam algorithm. The system is aiming to reduced propagation delay and area of the filter. The proposed system based on Vedic multiplier is compared with that on conventional multiplier on the basis of resources and time required for processing given data. The comparison shows the 36.29% and 15.70% reduction in propagation delay for two-parallel and three-parallel FIR filter using Vedic multiplier as compared to that of conventional multiplier. The architecture is coded in VHDL and synthesized and simulated by using Xilinx Design Suite 13.1 ISE

    “CSMA-Based and Optimal link scheduling in Multihop MIMO Networks using SINR Model ”

    Get PDF
    The development of high-performance distributed scheduling algorithms for multi-hop wireless networks have become a matter of interest in recent years. The problem is challenging when studied under a physical interference model because it requires the SINR to be above a certain threshold at the receiver for decoding success. Under this SINR model, the transmission failure can be caused by interference due to simultaneous transmissions from far away nodes, which intensifies the difficulty in developing a distributed algorithm for link scheduling. In this paper, we are going to propose scheduling algorithm that uses carrier sensing and show that the algorithm is applicable to distributed implementation as well as it results in throughput optimality. This algorithm has a feature called the dual-state approach. It separates the transmission schedules from the system state means control state ans data state are separated hence can be shown to improve delay performance

    'Ossification'- a novel approach for immobilisation of platinum group metal complex catalysts

    Get PDF
    The technique known as 'ossification' has emerged as one of the most promising approaches for immobilisation of metal complexes, generating highly selective, stable and recyclable heterogeneous counterparts of homogeneous catalysts. 'Ossification' involves modifying the ligand(s) in a metal complex catalyst to achieve inherently insoluble forms of the metal complexes, without destroying the configuration responsible for their catalytic properties. The ossified catalysts have been demonstrated to show high catalytic activity and selectivity for a number of industrially important reaction classes such as palladium-catalysed carbonylation and Suzuki coupling and rhodium-catalysed hydroformylation. The characterisation of these catalysts has also shown that the key features of their homogeneous metal complex analogues are retained on immobilisation. The approach is very useful for the design and development of immobilised catalysts with specific features and functionality for various applications. It is also advantageous for catalyst-product separation. This article reviews the recent work on ossification involving platinum group metal complex catalysts in our research group

    “CSMA-Based Link Scheduling in Multihop MIMO Networks using SINR Model ”

    Get PDF
    The main aim of this study to resolve the problem of distributed scheduling in multi-hop MIMO networks. We will first develop a “MIMO pipe” model which will provide the required SINR , which gives the rate-reliability tradeoff in MIMO communications.Here we are going to study development of CSMA-based MIMO-pipe scheduling especially under the SINR model.We are going to choose the SINR model over the conventionally studied matching or protocol-based interference models because it has ability to capture the impact of interference in wireless networks. Here each node is equipped with an antenna array. In CSMA based scheduling, nodes will first sense the channel activity before attempting transmissions, whenever the channel is sensed to be idle, the nodes will continue with data transmissions. When the channel is detected to be busy, the nodes have to wait for a random amount of backoff time before reattempting the transmission.We will study that protocol model based throughput-optimal CSMA based scheduling, would not work well under the SINR model because its has dynamic and intrinsic link coupling. To tackle this challenge,CSMA-based MIMO-pipe scheduling is develpoed in both discrete-time system and continuous-time system

    Misuse of Service Pistol in a Dyadic Death

    Get PDF
    Background: Homicide followed by the perpetrator's suicide commonly seen in dyadic death. The time lag between homicide and suicide is very less. Dyadic deaths are rare in occurrence and their nature varies in each case. Also, the causes of death in suicide and homicide are different but it may be same in few cases. Perpetrators are usually male and always use weapons that are easily available in their vicinity for homicide and suicide.Case Report: We received two calls, one hour apart from a local police station in South Mumbai, regarding death due to firearm injuries. At the first crime scene, we found a forty-year policeman with a contact shot over the right temporal region. Subsequently, we visited second crime scene that was 100 meters away from the first crime scene. We observed a forty-eight-year-old female with contact shot over the sternal region. Initially investigating authorities mystified over two deaths due to the firearm. We collected evidence from crime scenes. We performed autopsies at the tertiary care teaching hospital. We studied role of perpetrator dyadic death and constructed a crime scene.Conclusion: Meticulous efforts revealed a dyadic death i.e. murder followed by suicide due to an extra-marital relationship and monetary dispute. Also, the misuse of service pistol (issued by police department) by the perpetrator for killing the victim and himself

    Degraded Document Image Binarization Using Segmentation Algorithm

    Get PDF
    Degraded document image binarization is very difficult process due to different types of degradation over the document. Multiple algorithms as well as methods are available to get clear image of degraded document image. Many researchers have worked in this field of image processing. Still there is scope to get more clear and upgraded document image. Image segmentation is very famous process in the image processing domain. Image segmentation can used to binarize degraded document image. Binarization is a process to generate binary image from gray scale image. Also it is tedious to differentiate foreground and background pixel due to degradation. In this paper, Image Segmentation using thresholding is proposed for degraded document image binarization. Image segmentation gives better result than canny edge approach. DOI: 10.17762/ijritcc2321-8169.150611

    An Efficient Technique to Secure Data Access for Multiple Domains using Overlapping Slicing

    Get PDF
    Data Mining is the process of analysing data from different perspective, summarizing it into useful information and extracts the needed information from the database. Most enterprises are collecting and storing data in large database. Database privacy is a important responsibility of organizations for to protects clients sensitive information, because their clients trust them to do so. Various anonymization techniques have been proposed for the privacy of sensitive microdata. However, there is considered between the level of privacy and the usefulness of the published data. Recently, slicing was proposed as a technique for anonymized published dataset by partitioning the dataset vertically and horizontally. This paper proposes a technique to increase the utility and privacy of a sliced dataset by allowing overlapped slicing while maintaining the prevention of membership disclosure. Also provide secure data access for multiple domains. This novel approaches work on overlapped slicing to improve preserve data utility and privacy better than traditional slicing. DOI: 10.17762/ijritcc2321-8169.16045
    • …
    corecore