223 research outputs found
Study of cervical cytology in pap smears in a tertiary care hospital of North Maharashtra
Background: Cervical cancer is the fourth leading cause of death in females worldwide. In India cervical cancer is the leading cause of morbidity and mortality. Cancer of cervix is preventable, and can be diagnosed at the pre-malignant stage with adequate and repetitive cytological screening by Papanicolaou (Pap) smears. Aim of this study was to study the role of Pap smear in detecting premalignant and malignant lesions as well as non-neoplastic lesions of cervix.
Methods: It is a retrospective study of 240 pap smears studied from January 2022 to June 2022 and received in pathology department of a tertiary care hospital of north Maharashtra. Samples are collected from women between 21 to 65 years presenting with some gynecological problems. Smears were reported as per the 2014 Bethesda system.
Results: Out of 240 women, 216 were having normal cytology and 146 cases with inflammatory changes. 10 cases were unsatisfactory. 5 cases of ASCUS, 1 case of SCC, 2 cases of HSIL and 6 cases of LSIL were observed.
Conclusions: Pap smear test is a simple, safe, noninvasive, economical OPD based procedure to detect pervasive cervical epithelial lesions. Every woman should undergo Pap test at least once in her life before the age of 45 years
Garbhsanskar Guru App: A Comprehensive Cross-Sectional Study on Pregnancy Outcomes and Maternal Well-being
This whitepaper provides an in-depth analysis of a cross-sectional study on the Garbhsanskar Guru app, focusing on its significant impact on pregnancy outcomes and maternal well-being. Involving 1,323 mothers who practiced Garbh Sanskar through the app, the study collected data through a postnatal survey, revealing positive influences on baby's birth weight, delivery timing, and maternal stress and positivity levels. The results demonstrate the app's effective role in enhancing pregnancy outcomes and maternal mental health
Implementation of Fast, Low Power and Area Efficient Carry Select Adder
One of the fastest adders is Carry Select Adder (CSLA) and it perform fast arithmetic functions in many data processing processors. A conventional CSLA has less carry propagation delay (CPD) than ripple carry adder (RCA). A compromise between RCA and carry look ahead adder is provided by Carry select adder. For the CSLA new logic is proposed by reducing redundant logic operations present in conventional CSLA. In the proposed scheme, schedule the carry select (CS) operation before final sum calculation. which is different approach from the conventional. Two carry words ( cin = 0 and 1) bit patterns and fixed cin bits use for generation units and CS logic optimization. Optimized logic units is used to obtain an efficient CSLA design. The proposed work is carried out using Modelsim SE 6.3f and Quatus2 software.
DOI: 10.17762/ijritcc2321-8169.16046
Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. A cover image is fused with secret image; fused image is divided into n shares. k possible shares able to construct secret image. PSNR parameter are used for image quality The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database
Recent Advances in Heat Transfer Augmentation by using Twisted Tapes: A Review
In the past decade several studies on the passive techniques of heat transfer augmentation have been reported. The present paper is a review on progress with the passive augmentation techniques in the recent past and will be useful to designers implementing passive augmentation techniques in heat exchanger. In passive technique twisted tape insert is playing an important method to enhance the heat transfer characteristics of a heat exchanger without affecting much the overall performance of the system. The present review is organized in two different sections: augmentation of heat transfer in laminar flow and augmentation of heat transfer in turbulent flow. Key words: Heat transfer augmentation, Passive methods, Twisted Tape inserts, Reynolds number, Friction facto
A Review on an Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database
EFFICACY OF AYURVEDIC THERAPIES ON PSORIASIS: A REVIEW ON RESEARCHES CONDUCTED AT GUJARAT AYURVED UNIVERSITY, JAMNAGAR
Psoriasis is a chronic disease that has substantial psychological and social impact on a patients life. However the treatment options available in contemporary system of medicine are not much satisfactory. Psoriasis is far more than just a skin disease and is equated to Eka Kushtha in Ayurveda. Various clinical studies have been carried out at different research centers in India on Psoriasis (Eka Kushtha). Present study is aimed to compile such available research works in various departments of two PG institutes under Gujarat Ayurved University. Total 27 completed research works on Psoriasis were found at PG (24) and PhD (3) levels, which revalidated the impact of various Ayurvedic treatment modalities (viz. Shodhana and Shamana). In Shamana therapy maximum drugs were of Vata Kapha Shamaka, Rakta Prasadana, Vishaghna, Kushthaghna and Kandughna etc. properties, which effectively counteract the etio-pathogenesis of Psoriasis. Whereas, in Shodhana therapy maximum times Virechana procedure was carried out. The therapies were found to be significantly effective and clinically safe as no adverse drug reactions were reported during treatment period
MultiSiam: A Multiple Input Siamese Network For Social Media Text Classification And Duplicate Text Detection
Social media accounts post increasingly similar content, creating a chaotic
experience across platforms, which makes accessing desired information
difficult. These posts can be organized by categorizing and grouping duplicates
across social handles and accounts. There can be more than one duplicate of a
post, however, a conventional Siamese neural network only considers a pair of
inputs for duplicate text detection. In this paper, we first propose a
multiple-input Siamese network, MultiSiam. This condensed network is then used
to propose another model, SMCD (Social Media Classification and Duplication
Model) to perform both duplicate text grouping and categorization. The
MultiSiam network, just like the Siamese, can be used in multiple applications
by changing the sub-network appropriately
An individually verifiable voting protocol with complete recorded-as-intended and counted-as-recorded guarantees
Democratic principles demand that every voter should be able to individually
verify that their vote is recorded as intended and counted as recorded, without
having to trust any authorities. However, most end-to-end (E2E) verifiable
voting protocols that provide universal verifiability and voter secrecy
implicitly require to trust some authorities or auditors for the correctness
guarantees that they provide.
In this paper, we explore the notion of individual verifiability. We evaluate
the existing E2E voting protocols and propose a new protocol that guarantees
such verifiability without any trust requirements. Our construction depends on
a novel vote commitment scheme to capture voter intent that allows voters to
obtain a direct zero-knowledge proof of their vote being recorded as intended.
We also ensure protection against spurious vote injection or deletion post
eligibility verification, and polling-booth level community profiling
- …