1,356 research outputs found

    The association of state per capita income and military service deaths in the Vietnam and Iraq wars

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>In the United States, social burdens including war casualties are often distributed unequally across groups of individuals, communities, and states. The purpose of this report was to examine the association between war deaths and per capita income in the 50 states and District of Columbia during the Vietnam and Iraq wars.</p> <p>Methods</p> <p>The numbers of deaths by the home state of record for each conflict were obtained from Department of Defense records on the Internet as were key variables including age at death, gender, race, branch of service, rank, circumstances of death, home state of record and the ratio of wounded to dead. In addition, we obtained state per capita income and state population for the relevant times.</p> <p>Results</p> <p>Characteristics of decedents in the 2 conflicts were very similar with young, white enlisted men accounting for the majority of deaths. However, in the Iraq war, women accounted for a 2.4% of casualties. Also of note was the higher ratio of wounded to dead in Iraq. At the level of the state, the correlation between the ratio of deaths per 100,000 and per capita income was -0.51 (p < 0.0001) for Vietnam and -0.52 for Iraq (p < 0.0001). In both eras, states with lower per capita income tended to have higher ratios of deaths per population.</p> <p>Conclusion</p> <p>For military service members serving in the Vietnam and Iraq conflicts, there were many more women who died in the latter war. Whether war deaths resulted in lower per capita income cannot be determined from these cross sectional data; we simply note a strong association between per capita income and war casualty rates for both wars.</p

    CFD Analysis to Study Effect of Circular Vortex Generator Placed in Inlet Section to Investigate Heat Transfer Aspects of Solar Air Heater

    Get PDF
    CFD analysis of 2-dimensional artificially roughened solar air heater duct with additional circular vortex generator, inserted in inlet section is carried out. Circular transverse ribs on the absorber plate are placed as usual. The analysis is done to investigate the effect of inserting additional vortex generator on the heat transfer and flow friction characteristics inside the solar air heater duct. This investigation covers relative roughness pitch in the range of 10 ≤ P/e ≤ 25 and relevant Reynolds numbers in the range of 3800 ≤ Re ≤ 18000. Relative roughness height (e/D) is kept constant as 0.03 for analysis. The turbulence created due to additional circular vortex generator increases the heat transfer rate and at the same time there is also increase in friction factor values. For combined arrangement of ribs and vortex generator, maximum Nusselt number is found to be 2.05 times that of the smooth duct. The enhancement in Nusselt number with ribs and additional vortex generator is found to be 1.06 times that of duct using ribs alone. The maximum increase in friction factor with ribs and circular vortex generator is found to be 2.91 times that of the smooth duct. Friction factor in a combined arrangement is 1.114 times that in a duct with ribs alone on the absorber plate. The augmentation in Thermal Enhancement Factor (TEF) with vortex generator in inlet section is found to be 1.06 times more than with circular ribs alone on the absorber plate

    Peri-operative pulse oximetry in low-income countries: a cost–effectiveness analysis

    Get PDF
    Abstract Objective: To evaluate the cost–effectiveness of pulse oximetry – compared with no peri-operative monitoring – during surgery in low-income countries. Methods: We considered the use of tabletop and portable, hand-held pulse oximeters among patients of any age undergoing major surgery in low-income countries. From earlier studies we obtained baseline mortality and the effectiveness of pulse oximeters to reduce mortality. We considered the direct costs of purchasing and maintaining pulse oximeters as well as the cost of supplementary oxygen used to treat hypoxic episodes identified by oximetry. Health benefits were measured in disability-adjusted life-years (DALYs) averted and benefits and costs were both discounted at 3% per year. We used recommended cost–effectiveness thresholds – both absolute and relative to gross domestic product (GDP) per capita – to assess if pulse oximetry is a cost–effective health intervention. To test the robustness of our results we performed sensitivity analyses. Findings: In 2013 prices, tabletop and hand-held oximeters were found to have annual costs of 310 and 95 United States dollars (US),respectively.Assumingthetwotypesofoximeterhaveidenticaleffectiveness,asingleoximeterusedfor22proceduresperweekaverted0.83DALYsperannum.ThetabletopandhandheldoximeterscostUS), respectively. Assuming the two types of oximeter have identical effectiveness, a single oximeter used for 22 procedures per week averted 0.83 DALYs per annum. The tabletop and hand-held oximeters cost US 374 and US115perDALYaverted,respectively.ForanycountrywithaGDPpercapitaaboveUS 115 per DALY averted, respectively. For any country with a GDP per capita above US 677 the hand-held oximeter was found to be cost–effective if it prevented just 1.7% of anaesthetic-related deaths or 0.3% of peri-operative mortality. Conclusion: Pulse oximetry is a cost–effective intervention for low-income settings

    Implementation of Security Protocol for Wireless Computer in Virtual Laboratory

    Get PDF
    Implementing security model for wireless computer network we require effective Wireless intranet setup; many models are in working to funct ion. This thing is focused at developing a security model to secure a Wireless Computer network of any institution. The model will develop to secure a Wireless Computer class - room through an authentication server by supplying authentication constraint at registration process, which is used at login for comparison then it will store. Fingerprint is used to make sure that a user is who claims to be. Time duration for access is allotted fo r a user, after which primary constraint will supplied for re - authentica tion. While a user is still logged - on, some security questions will pose intermittently to avoid counterfeiting. The methodology used for this research will be Structured System Analysis and Design (SSAD). For coding the program Java Programming Language w ill use and MySQL as a database. The final result of the system will secure model that guarantees secure access. This is different from the security of other wireless virtual class - room which uses only users name, pin or registration number

    KNN-Based ML Model for the Symbol Prediction in TCM Trellis Coded Modulation TCM Decoder

    Get PDF
    Machine Learning is a booming technology today. In a machine learning set of training, data is to be provided to the model for training and that model predicts the output. Machine Learning models are trained using a computer program known as ML algorithms.The new machine learning-based Transition Metric Unit (TMU) of 4D- 8PSK Trellis coded Modulation TCM Decoder is presented in this work. The classic Viterbi decoder's branch metric unit, or TMU, takes on a complex structure. Trellis coded Modulation (TCM) is a combination of 8 PSK modulations and Error Correcting Code (ECC). TMU is one of the complex units of the TCM decoder, which is essentially a Viterbi decoder. Similar to how the first Branch metric is determined in the straightforward Viterbi decoder, the TCM decoder performs this BM computation via the TMU unit. The TMU becomes challenging and uses more dynamic power as a result of the enormous constraint length and the vast number of encoder states.In the proposed algorithm innovative KNN (K nearest neighbours) based ML model is developed. It is a supervised learning model in which input and output both are provided to the model, training data also called the labels, when a new set of data will come the model will give output based on its previous set experience and data.Here we are using this ML model for the symbol prediction at the receiver end of the TCM decoder based on the previous learning. Using the proposed innovation, the paper perceives the optimization of the TCM Decoder which will further reduce the H/W requirements and low latency which results in less power consumption

    Reversible ALU Circuit Realization Using Verilog HDL

    Get PDF
    Reversibility in computing implies that no info regarding the process states will ever be lost, thus, we are able to recover any earlier stage by computing backwards or un-computing the results. This is often termed as logical changeability. The advantages of logical changeability are gained solely when using physical changeability. Physical changeability may be a method that dissipates no energy to heat. Completely excellent physical changeability is much impossible. Computing systems provide off heat once voltage levels modification from positive to negative: bits from 0 to 1. Most of the energy required to create that modification is given off within the style of heat. Rather than dynamic voltages to new levels, reversible circuit parts can bit by bit move charge from one node to subsequent. This way, one will solely expect to lose a second quantity of energy on every transition. Reversible computing powerfully affects digital logic styles. Reversible logic parts square measure required to recover the state of inputs from the outputs. It will impact instruction sets and high-level programming languages similarly. Eventually, these will need to be reversible to produce best potency

    Death and dying in ‘Third Way’ death manuals: Shaping life and death after neoliberalism

    Get PDF
    In this chapter, I consider what might be called the “Third Way” death manuals of Philip Gould and Kate Gross, who were both, in different ways, involved with the New Labour Project. Their memoirs describe their experiences of dying and are notable for the conclusions to which they come; conclusions which suggest values at odds with the individualist and progressive narratives that shape neoliberal views of what it means to life well. In considering the tensions and possibilities that shape their respective narratives, new ways of living in the face of death become possible

    Characterization of a bacterial collar and rhizome rot of banana (Musa paradisiaca) caused by strains of Erwinia chrysanthemi pv. paradisiaca

    Get PDF
    A serious collar and rhizome rot disease of banana was observed in the north region of Maharashtra state in post rainy season. The disease was caused by the bacterial strains of Erwinia chrysanthemi pv. paradisiaca identified and characterized by morphological, physiological, biochemical and pathogenicity tests. The infection occurred on new banana plantation of one month old in poorly drained soil. In post rainy season, banana plantations of 8 to 10 weeks were found severely infected. E. chrysanthemi pv. paradisiaca produced soft rot symptom onhealthy banana rhizomes within three weeks. Two strains were isolated from the collar and rhizome rotted diseased samples which were similar in morphological, physiological and biochemical characteristics, however they differed in the virulence aggressiveness to cause the disease in banana. Strain II caused soft rot symptoms within 19 days, however strain I produced it within 23 days of inoculation with suspension of 3×108 CFU ml-1. The result of this study revealed that strain II was more aggressive as compared to strain I of E. chrysanthemi pv. paradisiaca
    corecore