137 research outputs found

    Security during Transmission of Data Using Web Steganography

    Get PDF
    The project entitled Steganography is to give security to a content record. Since the security of the data over the internet has raised a concern to the people. There are many methods to protect the data from going into the access of unauthorized people. Steganography can be used along with the encryption technique to secure the data. Steganography is used to hide the data or a secret message whereas cryptography is used to encrypt the message and make it difficult the people to read. So, the proposed system is to combine both steganography and cryptography for the secret data transmission. The transmission can be done by using an image as a carrier of data. This paper uses high-performance BMP steganography along with a substitution encryption methodology. The approach that is used here is IDEA (International Data Encryption Algorithm) algorithm which is used for encryption. The IDEA algorithm works as follows, it will take the TEXT document and mystery key as the input and gives the encrypted and BMP picture as the output for the sender side. There can additionally be “Voice Recognition System” framework so that it can use voice to decrypt the message. This is the future expansion or scope of this paper

    Pure uterine lipoma on 18FDG PET/CT: rare but easy to diagnose.

    Get PDF
    Tumors of the uterus are extremely uncommon. Pure lipomas of the uterus are very rare, and only a few cases have been reported. We are presenting a case of a post-menopausal lady, a survivor of right breast cancer who had an 18 F-fluorodeoxyglucose positron emission tomography/computed tomography (18FDG PET/CT) for evaluation of a suspected right lung nodule. The scan was negative for hypermetabolic abnormality. However, a hypodense and non-metabolic lesion was seen in the fundus of the uterus. On subsequent hysterectomy, it was found to be a pure lipoma

    Financial Leverage and Its Impact on Profit Margin in Pakistan’s Textile Industry

    Get PDF
    The core purpose concerned in this study remains to explore the impact of the financial leverage on the stitched textile industry, and mainly on the profit margin. The textile industry in Pakistan is said to be the largest manufacturing industry and so is the stitching industry increasing with the great importance of readymade dresses especially among females. The objective set in this study remains to study the relationship between the Financial Leverage (FL) and the Profit Margin (PM). This further includes the proving of the idea that the stitched industry becomes more profitable as soon as the financial leverage has been adopted by the companies. The data from 10 Stitched-Textile companies has been gathered as a sample in this study, from the period of 2012 to 2015 for data analysis. The tools used for data analysis comprised of descriptive analysis, correlation analysis,and regression analysis. The results from this analysis conclude that in the stitching industry there is no significance recognition but positive impact on the FL by the PM. Therefore, it is being recommended that the best possible use of the FL should be made by the stitched industry in order to achieve the target of becoming the most profitable industry of Pakistan Textile Industry. Furthermore, it could be noted that the optimum increase in the production of the textile industry would help in minimizing the level of poverty in Pakistan and also building a healthy population. Keywords: Financial Leverage; Profit Margin, Stitched-Textile Industry, profitability. DOI: 10.7176/EJBM/11-12-13 Publication date: April 30th 201

    Sentinel lymph node scintigraphy and radioguided dissection in breast carcinoma: an initial experience at Aga Khan University Hospital

    Get PDF
    Objective: To evaluate the efficacy of SLN biopsy using imaging and gamma probe in breast cancer and to establish this technique at Aga Khan University Hospital.Methods: Thirty two patients (mean age 33-76 yrs) with operable breast carcinoma (4 with post-neo adjuvant therapy) with clinically negative axilla were studied. In 28 patients simultaneous axillary dissection was performed. Sentinel lymph nodes (SLN) scintigraphy was performed a day before surgery by injecting Tc-99m labeled nannocolloid sub-dermally in the peri-areolar region in 24 and peri-tumoral in remaining 8. First lymph node (LN) to appear to on the scan was labeled as SLN and marked on the skin. Blue dye was also injected in all patients and blue and hot LN was explored in the axilla using gamma probe.Results: The sentinel LN was identified in 31 patients (96.9% success rate) while in one patient (3.1%) SLN was not visualized on the scan (negative study) and this was a post-neo-adjuvant therapy case. The blue dye successfully localized the sentinel LNs in all 32 cases The gamma probe guided localization was successful in all 31 while in one case with post-neo-adjuvant chemotherapy it failed. In 9 out of 32 (28.1%) cases SLN was positive for metastasis and in 6 out of these 9 (66.6%) the SLN was the only metastatic node. This includes the post-neo-adjuvant case as well. There was no case of skip metastasis, i.e. negative SNL and positive other axillary nodes. In remaining 23 (71.9%) cases SLN was negative for metastasis and in all, axilla was free of disease (NPV of 100%).CONCLUSION: Lymphoscintigraphy with gamma probe guided SNL biopsy is safe, simple and highly reliable technique. With blue dye technique it reduces the blindness of the procedure if performed independently but increases the cost. Finally, this can accurately stage the axilla, possibly allowing axillary dissection to be foregone in patients where the SLN is clear

    99mTc-Nannocolloid Localization of Lymphorenal Fistula Causing Chyluria

    Get PDF
    Chyluria is an abnormal condition in which chyle appears in the urine because of a fistulous communication between the lymphatics and the urinary tract. It is not life-threatening and spontaneous regression is reported in 50% of cases. Lymphangiography has been the main imaging modality for localization of the site of fistula, but it is invasive and requires expertise. Lymphoscintigraphy using Tc-99m labelled colloid is a safe, non-invasive, reproducible technique, which bears less radiation exposure. A 67-year-old male presented with 7-month history of chyluria following a spinal surgery. Bilateral lower limb lymphoscintigram revealed sluggish lymph flow in the left lower limb and visualization of tracer in the left kidney consistent with lymphorenal fistula. Subsequent cystography revealed appearance of chylous urine from left ureter. Patient refused surgery

    Studies on the antidiarrhoeal, antimicrobial and cytotoxic activities of ethanol-extracted leaves of yellow oleander (Thevetia peruviana)

    Get PDF
    This study screened the antidiarrhoeal, antimicrobial and cytotoxic effects of ethanol-extracted leaves of yellow oleander (Thevetia peruviana). The extract was tested against castor oil-induced diarrhoea in a model of albino rats and showed significant antidiarrhoeal activity (P<0.01). Disc diffusion technique was used to test the in vitro antibacterial activities of the extract and exhibited poor antibacterial activities against both Gram positive and Gram negative bacteria (mainly Bacillus sp). Ethanol-extracted leaves of yellow oleander showed narrow zone of inhibition in the bacterial lawns of Shigella flexineri, Salmonella typhi, Klebsiella sp, Staphylococcus aureus and Shigella sonnei. Cytotoxicty was determined against brine shrimp nauplii and LC50 of the plant extract was determined as 627.21μg/ml. The wide range of LC50 value denotes the safety effect of the extract

    How Hard is Bribery in Elections with Randomly Selected Voters

    Get PDF
    Many research works in computational social choice assume a fixed set of voters in an election and study the resistance of different voting rules against electoral manipulation. In recent years, however, a new technique known as random sample voting has been adopted in many multi-agent systems. One of the most prominent examples is blockchain. Many proof-of-stake based blockchain systems like Algorand will randomly select a subset of participants of the system to form a committee, and only the committee members will be involved in the decision of some important system parameters. This can be viewed as running an election where the voter committee (i.e., the voters whose votes will be counted) is randomly selected. It is generally expected that the introduction of such randomness should make the election more resistant to electoral manipulation, despite the lack of theoretical analysis. In this paper, we present a systematic study on the resistance of an election with a randomly selected voter committee against bribery. Since the committee is randomly generated, by bribing any fixed subset of voters, the designated candidate may or may not win. Consequently, we consider the problem of finding a feasible solution that maximizes the winning probability of the designated candidate. We show that for most voting rules, this problem becomes extremely difficult for the briber as even finding any non-trivial solution with non-zero objective value becomes NP-hard. However, for plurality and veto, there exists a polynomial time approximation scheme that computes a near-optimal solution efficiently. The algorithm builds upon a novel integer programming formulation together with techniques from n-fold integer programming, which may be of a separate interest
    corecore