1,030 research outputs found

    Study of the causes and factors which affect compliance of the patient in directly observed short course chemotherapy in pulmonary tuberculosis in Central India

    Get PDF
    Background: TB is one of the most ancient diseases. World Health Organization (WHO) estimated 9.2 million new cases in 2014 out of which 2.2 million were from India. National tuberculosis programme was started since 1962 and short course chemotherapy was included in 1983. With this background in 1992 WHO and Swedish International Development Agency (SIDA) reviewed the programme. As a result, revised national tuberculosis programme (RNTCP) was started. RNTCP recommended directly observed short course chemotherapy in pulmonary tuberculosis (DOTS) and was implemented in 1993. Objective of present study was to find out the causes and factors affecting compliance of the patients in directly observed short course chemotherapy in pulmonary tuberculosis.Methods: We studied 100 patients of pulmonary tuberculosis, who were sputum smear positive for tubercle bacilli. Patients were treated with DOTS (Directly Observed Short Course Chemotherapy) recommended by RNTCP and we observed the causes and factors responsible for interruption of the treatment in noncompliant patients.Results: Overall compliance was 78% and 22% patients were noncompliant. Most common cause of noncompliance was side effects of drugs (12%), noncompliance was maximum (45.45%) between age group of 15-25 years. Illiterate and low socioeconomic status patients were more noncompliant 46.45% and 63.63% respectively.Conclusions: Eventually, after seeing all merits and demerits of DOTS, we have concluded that intensive health education may have favourable impact to improve further outcome of DOTS and compliance of the patients

    Bearing Fault Evaluation for Structural Health Monitoring, Fault Detection, Failure Prevention and Prognosis

    Get PDF
    AbstractIn this work the two disciplines of condition based maintenance (CBM), structural health monitoring (SHM) and prognostics are described fault identification and estimation is an important and necessary step in condition based maintenance. In the present work, an experiment is carried out with a customized test setup where the seeded defects are introduced in the inner race and outer race of a radial ball bearing. The relationship between the acquired vibration data and their relation with the seeded defect is found in this paper. When experiment is performed on the test setup designed for Fault prediction, Analytical Wavelet Transform proved an effective tool for the analysis of vibration signal. In this work, AWT followed by the Power Spectral Density is implemented on vibration signals of a defective Radial Ball Bearing. After finding the fault, its location and its intensity Ball Bearing's remaining useful life is estimated

    Superconformal Gravity And The Topology Of Diffeomorphism Groups

    Full text link
    Twisted four-dimensional supersymmetric Yang-Mills theory famously gives a useful point of view on the Donaldson and Seiberg-Witten invariants of four-manifolds. In this paper we generalize the construction to include a path integral formulation of generalizations of Donaldson invariants for smooth families of four-manifolds. Mathematically these are equivariant cohomology classes for the action of the oriented diffeomorphism group on the space of metrics on the manifold. In principle these cohomology classes should contain nontrivial information about the topology of the diffeomorphism group of the four-manifold. We show that the invariants may be interpreted as the standard topologically twisted path integral of four-dimensional N=2\mathcal{N}=2 supersymmetric Yang-Mills coupled to topologically twisted background fields of conformal supergravity.Comment: 79 pages + appendices = 166 pages; 1 figure; Hyperlinks fixe

    An Experimental Approach for Encryption and Decryption of Image using Canonical Transforms & Scrambling Technique

    Get PDF
    Data security is a prime objective of various researchers & organizations. Because we have to send the data from one end to another end so it is very much important for the sender that the information will reach to the authorized receiver & with minimum loss in the original data. Data security is required in various fields like banking, defense, medical etc. So our objective here is that how to secure the data. This study is performed on MATLAB R2016b with standard databasegrey scale images like Barbara, Cameraman and Lenna or by using the personalize images in standard format. First of all, the images are scrambled and then the generation of a new complex image took place. Initially phase mask is applied on the complex image by using RPM 1, and then the complex image is encrypted by using LCT of first order. Again the phase mask RPM 2 is applied on the encrypted image followed by the LCT of second order to get the encrypted image finally. Reverse process is applied to get the original image. Various parameters are calculated which shows various aspects. Like Change in the value of MSE with change in order of transform tells the quality of encrypted image. Correlation coefficient of encrypted and decrypted image also shows the difference between the encrypted and decrypted image. The original image is then reconstructed and histogram of all these images analyzed. Robustness and imperceptibility of images increases by the proposed method

    A Review on Encryption and Decryption of Image using Canonical Transforms & Scrambling Technique

    Get PDF
    Data security is a prime objective of various researchers & organizations. Because we have to send the data from one end to another end so it is very much important for the sender that the information will reach to the authorized receiver & with minimum loss in the original data. Data security is required in various fields like banking, defence, medical etc. So our objective here is that how to secure the data. So for this purpose we have to use encryption schemes. Encryption is basically used to secure the data or information which we have to transmit or to store. Various methods for the encryption are provided by various researchers. Some of the methods are based on the random keys & some are based on the scrambling scheme. Chaotic map, logistic map, Fourier transform & Fractional Fourier transform etc. are widely used for the encryption process. Now day’s image encryption method is very popular for the encryption scheme. The information is encrypted in the form of image. The encryption is done in a format so no one can read that image. Only the person who are authenticated or have authentication keys can only read that data or information. So this work is based on the same fundamental concept. Here we use Linear Canonical Transform for the encryption process
    corecore