629 research outputs found

    Importance of Geriatrics in Psychiatric postgraduate education

    Get PDF
    Introduction To assess the importance of Geriatrics in Psychiatric postgraduate education Methodology Marks allotted in question papers from Geriatrics in Psychiatry postgraduate examination from a university for a 5-year period was evaluated. Discussion 1-6% of entire theory evaluation was related to Geriatric mental health topics predominantly on dementia and related disorders

    EXPERIMENTAL EVALUATION OF THE ANTI-ULCER ACTIVITY OF GRAPE (VITIS VINIFERA) SEED EXTRACT IN WISTAR ALBINO RATS AGAINST HYDROCHLORIC ACID – ETHANOL INDUCED ULCER MODEL

    Get PDF
    Background:Herbal products are finding increasing demand in the treatment of Peptic ulcer, on account of their better safety and efficacy.Objectives:To evaluate the anti-ulcer activity of ethanolic extract of seeds of Vitis Vinifera in Wistar albino rats.Methods:The ethanolic extract of Vitis Vinifera was investigated for its anti-ulcer activity in rats against HCl – Ethanol induced ulcer model. The antiulcer activity was assessed by determining and comparing gastric volume, pH, free and total acidity; ulcer number and its inhibition, ulcer severity and ulcer index.Results:A significant antiulcer activity was observed. The grape seed 100mg/kg group showed significant [p < 0.05] reduction in ulcer number 30.00 ± 3.23 as compared to the control. The grape seed 200mg/kg showed significant [p < 0.05] reduction in ulcer number 27.33 ± 2.97, free acidity 20.00 ± 2.26, and gastric lesion18.00 ± 2.96 as compared to the control.Conclusion:This present study indicates that Vitis vinifera seed extract has potential anti ulcer activity in the model tested. Keywords: Vitis vinifera, Anti-ulcer, Ethanol, Free acidity, Total acidit

    Seamless Handover of Video Streamingin 4G Wireless Network

    Get PDF
    This paper presents QoS aware seamless vertical handover system for video streaming over wireless network. When the user is moving, the signal strength varies which may resultin buffering of the video. Various modulation techniques are used for continuous streaming of video and to resolve this issue. OFDM technique is used for multi carrier transmission with modulation formats such as BPSK and 16QAM.The system modulator switches between the two modulation schemes depending upon the Signal to Noise Ratio (SNR).In order to achieve continuous streaming of video the video is compressed at the time of handover. Experimental results shows that the performance of the system is better

    ANALYSIS ON RETURN, RISK AND VOLATILITY OF SECTORAL INDICES AGAINST BSE

    Get PDF
    BSE has classified industrial grouping based on similar production processes, products or nature of business. Automobile, Banking, Energy, Fast moving Consumer Goods (FMCG), Healthcare, Industrials, IT, Oil & Gas, Power, Public Sector Undertakings (PSU) and Telecom are the classifications. This paper analyzes the return, risk and volatility of such sectoral indices against BSE for the period 2007:01 to 2016:12. The objectives of the study are “ To classify sectors based on Return (High, Medium and Low)”, “To classify sectors based on sensitivity (High, Medium and low), “To classify sectors based on risk (High, Medium and Low)”, “To classify sectors based on volatility”, “To find the sectors which moves with and against S&P BSE 500”. The study reviewed various relevant literatures available and various research works of past and present. The study gathered monthly closing index of S&P BSE 500 and sector wise monthly closing index for the period 2007:01 to 2016:12. The study adapted tools like Pearson correlation, Standard deviation, Beta and Linear Regression to ensure the validity. The study would contribute to investment decisions by investors in selecting sectors based on risk, return, volatility and sensitivity of market

    An Optimal Routing Protocol Using a Multiverse Optimizer Algorithm for Wireless Mesh Network

    Get PDF
    Wireless networks, particularly Wireless Mesh Networks (WMNs), are undergoing a significant change as a result of wireless technology advancements and the Internet's rapid expansion. Mesh routers, which have limited mobility and serve as the foundation of WMN, are made up of mesh clients and form the core of WMNs. Mesh clients can with mesh routers to create a client mesh network. Mesh clients can be either stationary or mobile. To properly utilise the network resources of WMNs, a topology must be designed that provides the best client coverage and network connectivity. Finding the ideal answer to the WMN mesh router placement dilemma will resolve this issue MRP-WMN. Since the MRP-WMN is known to be NP-hard, approximation methods are frequently used to solve it. This is another reason we are carrying out this task. Using the Multi-Verse Optimizer algorithm, we provide a quick technique for resolving the MRP-WMN (MVO). It is also proposed to create a new objective function for the MRP-WMN that accounts for the connected client ratio and connected router ratio, two crucial performance indicators. The connected client ratio rises by an average of 16.1%, 12.5%, and 6.9% according to experiment data, when the MVO method is employed to solve the MRP-WMN problem, the path loss falls by 1.3, 0.9, and 0.6 dB when compared to the Particle Swarm Optimization (PSO) and Whale Optimization Algorithm (WOA), correspondingly

    THE EFFICIENT IMAGE SEARCHING BY USING DYNAMIC MULTI-VIEW HASHING METHOD

    Get PDF
    Image processing is a method which takes an image as an input and show the image or highlights of the image as a output. It includes investigation and control to enhance the nature of the image. Image retrieval framework is perusing, looking and retrieval of the image in light of the given inquiry. The question might be a content or image. It recover the image in view of the shading, shape, surface and some different qualities of the image. Highlight extraction is to depict the highlights of the image with precision. Hashing is a method to change over the unpredictable data into file data, in light of the record data it can locate the required data effortlessly. Multi-see arrangement hashing technique is utilized to change over the image into parallel code, it depends on bit non-negative grid factorization. Non-negative lattice factorization is to study and discover the non-negative parts of the image data. Portion is to locate the moment parts that might be edges, bends, dabs in the images. KNMF dismisses the non-negative esteems in the piece images. In this paper, we recover the images utilizing various component extractors to get the related image from the given inquiry image look, the element extractors utilized as a part of this undertaking are GIST, HOG(Histogram Of Gradient), LBP(Local Binary Pattern), SURF(Speeded Up Robust Feature) and COLORHIST(Color histogram), it is assessed in caltech256 dataset and their outcomes demonstrate that utilizing different element extraction we can get the proficient image

    EFFICIENT SECRECY MAINTAINING CERTIFICATION SCHEME FOR VANET

    Get PDF
    Abstract VANET are one of the new promising techniques used to enable communication on roads. Here for VANETs an efficient secrecy maintaining authentication scheme is done .To detect anonymous authentication group signature is used widely used but in previous scheme it suffers from long computation delay in CRL (certificate revocation list) checking. It leads to a high message loss.so they cannot achieve the target of receiving 100 of messages per second.so HMAC is used here to avoid time consuming CRL checking and to ensure the integrity of messages before batch group authentication. To reduce authentication burden each vehicle needs to verify a small number of messages using cooperative message authentication among entities. Hence security and performance analysis shows that our scheme is more efficient in terms of authentication speed by keeping conditional privacy in VANETs. Thus the proposed scheme is analyzed through simulations in NS2 and proved to out performs the existing available techniques. Keywords-Vehicular Ad Hoc Network (VANET), CRL(Certificate Revocation List)HMAC(Hash Message Authentication Code),Cooperative Message Authentication. 1. Introduction In the advanced development of wireless communication technologies, car manufactures and telecom industries help to equip each vehicle with wireless devices. It allows vehicles to communicate with each other as well as with other vehicles network communication devices like road side units (RSU) and Trustedauthority (TA)etc. Generally a VANET consists of three components they are onboard units, Road side units and a central trusted authority. In VANET when vehicles communicate with each other and also with RSU and TA in which the attackers can easily get users private information such as identity, tracing etc. The reason is that they are not properly protected so we should design an efficiency secrecy maintaining authentication scheme for VANET. In previous scheme group signature is used for detecting unknown authentication so for which any group member allows to sign behalf of the group without reveling its real identity. So when a vehicle receives a message from unknown entity, a vehicle has to check the (certificate revocation list) CRL to avoid communicate with revoked vehicles. Also To verify the sender's group signature to check the validity of the received message. The problem here occurs is the time consuming for CRL checking because it takes 11ms to verify a message with a group signature and 9ms to check one identity in CRL. If n revoked number in CRL th number of messages verified in one second is 1000/9n+1 it is very smaller than the target of verifying 600.so we should try to overcome the delay caused by CRL checking and group signature verification to achieve rapid authentication. Thus an efficient privacy authentication scheme for VANET has been done through RSU by jointly using the techniques of distributed management, HMAC, group signature verification and cooperative authentication. First dividing the precinct into several domains so the system can run in a localized manner. Then HMAC is calculated with group key generated by the self-healing group-key generation algorithm which reduces time consuming CRL checking and ensure the integrity of messages before batch verification. Then cooperative message authentication is used to improve the message authentication scheme .By using these P.Anand Sateesh Kumar et al

    Evaluation of computerized health management information system for primary health care in rural India

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The Comprehensive Rural Health Services Project Ballabgarh, run by All India Institute of Medical Sciences (AIIMS), New Delhi has a computerized Health Management Information System (HMIS) since 1988. The HMIS at Ballabgarh has undergone evolution and is currently in its third version which uses generic and open source software. This study was conducted to evaluate the effectiveness of a computerized Health Management Information System in rural health system in India.</p> <p>Methods</p> <p>The data for evaluation were collected by in-depth interviews of the stakeholders i.e. program managers (authors) and health workers. Health Workers from AIIMS and Non-AIIMS Primary Health Centers were interviewed to compare the manual with computerized HMIS. A cost comparison between the two methods was carried out based on market costs. The resource utilization for both manual and computerized HMIS was identified based on workers' interviews.</p> <p>Results</p> <p>There have been no major hardware problems in use of computerized HMIS. More than 95% of data was found to be accurate. Health workers acknowledge the usefulness of HMIS in service delivery, data storage, generation of workplans and reports. For program managers, it provides a better tool for monitoring and supervision and data management. The initial cost incurred in computerization of two Primary Health Centers was estimated to be Indian National Rupee (INR) 1674,217 (USD 35,622). Equivalent annual incremental cost of capital items was estimated as INR 198,017 (USD 4213). The annual savings is around INR 894,283 (USD 11,924).</p> <p>Conclusion</p> <p>The major advantage of computerization has been in saving of time of health workers in record keeping and report generation. The initial capital costs of computerization can be recovered within two years of implementation if the system is fully operational. Computerization has enabled implementation of a good system for service delivery, monitoring and supervision.</p

    Deficiency and Also Transgenic Overexpression of Timp-3 Both Lead to Compromised Bone Mass and Architecture In Vivo

    Get PDF
    Tissue inhibitor of metalloproteinases-3 (TIMP-3) regulates extracellular matrix via its inhibition of matrix metalloproteinases and membrane-bound sheddases. Timp-3 is expressed at multiple sites of extensive tissue remodelling. This extends to bone where its role, however, remains largely unresolved. In this study, we have used Micro-CT to assess bone mass and architecture, histological and histochemical evaluation to characterise the skeletal phenotype of Timp-3 KO mice and have complemented this by also examining similar indices in mice harbouring a Timp-3 transgene driven via a Col-2a-driven promoter to specifically target overexpression to chondrocytes. Our data show that Timp-3 deficiency compromises tibial bone mass and structure in both cortical and trabecular compartments, with corresponding increases in osteoclasts. Transgenic overexpression also generates defects in tibial structure predominantly in the cortical bone along the entire shaft without significant increases in osteoclasts. These alterations in cortical mass significantly compromise predicted tibial load-bearing resistance to torsion in both genotypes. Neither Timp-3 KO nor transgenic mouse growth plates are significantly affected. The impact of Timp-3 deficiency and of transgenic overexpression extends to produce modification in craniofacial bones of both endochondral and intramembranous origins. These data indicate that the levels of Timp-3 are crucial in the attainment of functionally-appropriate bone mass and architecture and that this arises from chondrogenic and osteogenic lineages
    corecore