12 research outputs found

    Closed pinning for paediatric supracondylar fractures: does timing really matter?

    Get PDF
    Background: Management guidelines and comparative studies are not yet clear for those patients who present early and late with widely displaced supracondyle humerus fracture in children.Methods: A total of 74 children were included in this study, 30 patients presenting early within 24 hours as group 1, and 44 patients who presented late i.e. after 24 hours and within a week as group 2 underwent closed reduction and pinning.Results: In group one 24 had excellent, 6 had good results, according to modified Flynn’s criteria. One patient developed ulnar nerve palsy which was iatrogenic, and improved completely after wire removal. Another was brachial artery injury which was explored and recovered completely. In group 2 the average delay in presentation was 57.56 hours; mean time to surgery after presentation was 9.83 hours. Sixteen patients (36.36%) had neurologic complications at presentation to the emergency room of which three had median nerve palsy (6.81%) whereas seven (15.90%) had isolated anterior interosseous nerve palsy and six (13.6%) had radial nerve palsy all patients showed total neurological recovery at 12 weeks. Six patients (13.63%) had vascular compromise at initial presentation of which five patients had feeble radial pulse and one had absent radial pulse, but capillary filling was adequate in all. The pulse was restored within 24 hours in all patients following reduction. There were 37 excellent, 6 good and 1fair results.Conclusions: Our results support, closed reduction and Percutaneous pin fixation as an effective treatment option for grossly displaced supracondylar fractures presenting early and late but requires good and careful judgment and also technique

    Exploring Caching for Efficient Collection Operations

    Get PDF
    Many useful programs operate on collection types. Extensive libraries are available in many programming languages, such as the C++ Standard Template Library, which make programming with collections convenient. Extending programming languages to provide collection queries as first class constructs in the language would not only allow programmers to write queries explicitly in their programs but it would also allow compilers to leverage the wealth of experience available from the database domain to optimize such queries. This paper describes an approach to reducing the run time of programs involving explicit collection queries by leveraging a cache to store previously computed results. We propose caching the results of join (sub)queries which allows queries that miss the cache entirely to be answered partially from the cache thereby improving the query execution time. We also describe an effective cache policy to determine which join (sub)queries to cache. the cache is maintained incrementally, when the underlying collections change, and use of the cache space is optimized by a cache replacement policy. © 2011 IEEE

    Security and risk analysis in the cloud with software defined networking architecture

    Get PDF
    Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both cost-effective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data

    Groovy and Gnarly: Surface Wrinkles as a Multifunctional Motif for Terrestrial and Marine Environments

    Get PDF
    From large ventral pleats of humpback whales to nanoscale ridges on flower petals, wrinkled structures are omnipresent, multifunctional, and found at hugely diverse scales. Depending on the particulars of the biological system—its environment, morphology, and mechanical properties—wrinkles may control adhesion, friction, wetting, or drag; promote interfacial exchange; act as flow channels; or contribute to stretching, mechanical integrity, or structural color. Undulations on natural surfaces primarily arise from stress-induced instabilities of surface layers (e.g., buckling) during growth or aging. Variation in the material properties of surface layers and in the magnitude and orientation of intrinsic stresses during growth lead to a variety of wrinkling morphologies and patterns which, in turn, reflect the wide range of biophysical challenges wrinkled surfaces can solve. Therefore, investigating how surface wrinkles vary and are implemented across biological systems is key to understanding their structure-function relationships. In this work, we synthesize the literature in a metadata analysis of surface wrinkling in various terrestrial and marine organisms to review important morphological parameters and classify functional aspects of surface wrinkles in relation to the size and ecology of organisms. Building on our previous and current experimental studies, we explore case studies on nano/micro-scale wrinkles in biofilms, plant surfaces, and basking shark filter structures to compare developmental and structure-vs-function aspects of wrinkles with vastly different size scales and environmental demands. In doing this and by contrasting wrinkle development in soft and hard biological systems, we provide a template of structure-function relationships of biological surface wrinkles and an outlook for functionalized wrinkled biomimetic surfaces

    Data and code_Surapaneni et al., 2024. Ribbontail Stingray Skin Employs a Core–Shell Photonic Glass Ultrastructure to Make Blue Structural Color

    No full text
    This data is a supplement to V. A. Surapaneni, M. J. Blumer, K. Tadayon, A. J. McIvor, S. Redl, H.‐R. Honis, F. H. Mollen, S. Amini, M. N. Dean,Ribbontail Stingray Skin Employs a Core–Shell Photonic Glass Ultrastructure to Make Blue Structural Color. Adv. Optical Mater. 2024, 2301909. https://doi.org/10.1002/adom.202301909</p

    Comparison of efficacy between two doses of dexamethasone as an intratympanic injection in Idiopathic Sudden Sensorineural Hearing Loss

    No full text
    Introduction: Most cases of sudden sensorineural hearing loss (SSHL) are idiopathic, so there is no specific treatment protocol for this set of patients, which is accepted worldwide. Some temporal bone studies regarding histopathological findings in SSHL cases found that most of the lesions were in the cochlea and its structures. The histological findings suggest that some inflammatory, vascular or immunological aetiology are present behind such lesions in cochlea. Inflammation being one of the major among all the aetiologies, so steroids are the mainstay of treatment for Idiopathic sudden sensorineural hearing loss (ISSHL) cases. Material and methods: A prospective comparative study was done on 56 patients aged 18 to 70 years. Patients received 4mg/ml dose (Arm A) or 8mg/ml dose (Arm B) ofintratympanic dexamethasone injection. The targeted recovery on 5th day after 1st intratympanic steroid injection was compared with baseline Pure tone Audiometry (PTA)of day 1 for both the groups. Statistical analysis: More than 20db improvement in PTA average (0.5K,1k and 2k) onassessment at 5th day after 1stinjection was considered as recovery criteria. A comparison was done on improvement between two arms

    Developing an efficient method for melanoma detection using CNN techniques

    No full text
    Abstract Background More and more genetic and metabolic abnormalities are now known to cause cancer, which is typically deadly. Any bodily part may become infected by cancerous cells, which can be fatal. Skin cancer is one of the most prevalent types of cancer, and its prevalence is rising across the globe. Squamous and basal cell carcinomas, as well as melanoma, which is clinically aggressive and causes the majority of deaths, are the primary subtypes of skin cancer. Screening for skin cancer is therefore essential. Methods The best way to quickly and precisely detect skin cancer is by using deep learning techniques. In this research deep learning techniques like MobileNetv2 and Dense net will be used for detecting or identifying two main kinds of tumors malignant and benign. For this research HAM10000 dataset is considered. This dataset consists of 10,000 skin lesion images and the disease comprises nonmelanocytic and melanocytic tumors. These two techniques can be used for detecting the malignant and benign. All these methods are compared and then a result can be inferred from their performance. Results After the model evaluation, the accuracy for the MobileNetV2 was 85% and customized CNN was 95%. A web application has been developed with the Python framework that provides a graphical user interface with the best-trained model. The graphical user interface allows the user to enter the patient details and upload the lesion image. The image will be classified with the appropriate trained model which can predict whether the uploaded image is cancerous or non-cancerous. This web application also displays the percentage of cancer affected. Conclusion As per the comparisons between the two techniques customized CNN gives higher accuracy for the detection of melanoma

    A User Plane Security Protocol for ATM Networks (Extended Abstract)

    No full text
    Asynchronous Transfer Mode (ATM) has been identified as the transfer mode for implementing Broadband ISDN (BISDN), a universal network supporting different applications and customer categories. Many of these applications involve sensitive data or highly valuable information flows. Therefore, network security is one critical issue in offering ATM services. In this abstract, we first analyze the security requirements for ATM networks and identify the secure ATM protocol stack. Then, we propose a simple solution to enhance the user-plane security of ATM networks. Our solution utilizes the existing ATM signaling protocol (e.g., OA&amp;M F5 cells) to e..

    Polymerization‐induced wrinkled surfaces with controlled topography as slippery surfaces for colorado potato beetles

    Get PDF
    Controlling the interaction of insect populations with their host plants has recently received renewed attention in the light of pest control. One way to modify the interaction of insects with their host plants in a non‐chemical way is through influence of their de/attachment. Insect detachment has been observed for textured biological and structured artificial surfaces with morphologies ranging from nano‐ to micrometers (0.3–1.5 µm). Here, the formation of design surfaces is investigated through plasma‐induced polymerization of acrylates. This produces pronounced surface wrinkles that are tunable by the manufacturing process. For certain parameters, the wrinkles resemble those of the adaxial side of rubber tree (Hevea brasiliensis) leaves, a natural example of particularly low friction. Traction force measurements on the bio‐inspired surfaces show significantly impacted insect attachment compared to flat surfaces of silica and polymeric materials, opening a pathway to the controlled manufacture of bio‐inspired slippery surfaces for insects that could potentially find use in advanced materials such as wall coatings

    A study on association and correlation of lip and finger print pattern analysis for gender identification

    No full text
    Background: The lip print pattern is a unique among individuals and thus helps in the identification during the forensic investigation. Lip print analysis in the forensic scene may help in the personal identification. Thus, correlating the lip print with the finger print and gender will create a new room in forensic dentistry investigation. Aim: This study aims to identify the lip and finger print pattern and to correlate lip and finger print pattern for gender identification. Materials and Methods: A total of 100 students from dental institution were included in this study. Of which, 50 were male and 50 were female.. Their aged range between 18 and 28 years with a mean age of 21.3 years. The physiological rest position of the lip print was recorded by the application of red or dark pink colored lipstick over the lips and the imprint was transferred over a white chart sheet through a transparent tape. The imprint of the finger was taken directly on a white chart sheet. The lip and finger print pattern was examined with magnifying lens. The results were analyzed using SPSS software 19.0 (Armonk, NY, USA) and presented as a descriptive statistics. A correlation of lip print with finger print and gender variation was analyzed by Pearson correlation test. Results: The study identified higher prevalence of Type II (34%) lip print pattern in the overall study population. In males, Type I lip print (42%) and plain loop finger print pattern (44%) was frequent in the study. In males, the correlation of lip and finger print patter showed weaker correlation and statistically insignificant (P = 0.436). In females, Type II lip print (34%) and plain loop finger print pattern (42%) was frequent in the study. In females, the correlation of the lip and finger print pattern showed weaker correlation with approachable statistical significance (P = 0.083). The correlation of lip and finger print with gender showed weaker correlation and approachable significance (P = 0.07). The association of lip and finger print in the study showed statistically insignificant. However, the association of Type III lip print pattern with loop finger print pattern showed statistical significant association (P = 0.05) by Chi-square analysis. Conclusion: Lip print analysis is a challenging area in the personal identification during forensic dentistry examination. The study revealed the weaker correlation and approachable significance of lip and finger print pattern in gender identification. Future studies should be encouraged in the direction of software based identification for lip and finger print analysis in gender identification. Such studies may benefit this study pattern in more accurate way
    corecore