139 research outputs found

    Study of gastrointestinal toxicity of selective COX-2 inhibitors in comparison with conventional NSAIDs

    Get PDF
    Background: Adverse gastrointestinal events are the commonest unwanted effects of the NSAIDs, and are believed to result mainly from the inhibition of gastric COX-1, which is responsible for the synthesis of prostaglandins that normally inhibit acid secretion and protect the mucosa. Previous studies report, that selective COX-2 inhibitors are safer when compared to non-selective cyclooxygenase inhibitors, regarding their adverse effects on gastrointestinal system. But, recent studies reveal, that gastrointestinal safety of these selective COX-2 inhibitors is not much better than that of conventional NSAIDs. In view of the wider usage of selective COX-2 inhibitors, the study has been taken up to report, whether selective COX-2 inhibitors have got any advantages over conventional NSAIDs or not, in regard to their gastrointestinal side effects.Methods: Patients were divided into eight groups, fifteen patients of each. Each group was given one of the NSAIDs from the eight drugs those were selected for the study, for 15 days. In the selected group, along with the symptomatic assessment of gastric toxicity, both pre and post-treatment values of Hb% are estimated, tabulated & subjected to statistical analysis.Results: Both the drugs, diclofenac & meloxicam have shown significant changes in the Hb% values (‘p’ value 0.02 each), whereas selective COX-2 inhibitors like nimesulide & celecoxib were no less in gastric toxicity, in comparison with diclofenac, on symptomatic assessment.Conclusions: In our short-term study, selective COX-2 inhibitors did not show any advantage over non-selective NSAIDs regarding their gastrointestinal toxicity

    Pharma Image Information Extraction Using Image Processing

    Get PDF
    In order to obtain better recovery and avoid any side effects it is critical that the patient should take correct medicine for the illness they are suffering with. It is important that the medicine that is taken should produce the maximum benefit for the person. This is the very important aspect of medication but we are finding many cases wherein the erroneous information about the drug might create bad affects on the people and tend to extend many problems instead of reducing the ailment. The main reason for this, is lack of information about the drug to the patient and some being illiterate or mind belief on the drugs. So as to overcome this issue Pharma Image Information Extraction using Image Processing is a medication application which helps you to view the medicine based on the symptoms to which the medicine is to be used at anytime, anywhere through your phone. It helps you to get the information of the medicine by just sitting at your house and taking the picture of the medicine. This paper mainly focuses on extracting the text on the tablet strip and offer correct information about the tablet and vice versa which helps the illiterates not to get cheated with the dubious medicines mapping to the symptoms he/she is suffering with

    Design of Hybrid Full Adder using 6T-XOR-Cell for High Speed Processor Designs Applications

    Get PDF
    Hybrid-logic implementation is highly suitable in the design of a full adder circuit to attain high-speed low-power consumption, which helps to design n any high speed ALUs that can be used in varies processors and applicable for high speed IoT- Application. XOR/XNOR-cell, Hybrid Full Adder (HFA) are the fundamental building block to perform any arithmetic operation. In this paper, different types of high-speed, low-power 6T-XOR/XNOR-cell designs are being proposed and simulated results are presented. The proposed HFA is simulated using a cadence virtuoso environment in a 45nm technology with supply voltage as 0.8V at 1GHz. The proposed HFA consumes a power of 1.555uw, and the delay is 36.692ns.  Layout designs are drawn for both 6T-XOR/XNOR-cell, and 1- bit HFA designs. XOR/XNOR-cells are designed based on the combination of normal CMOS-inverter and Pass Transistor Logic (PTL). Which is used in the design of high end device processors such as ALU that can be implemented for the IoT- design applications

    World Social Work Day, 15 March 2022

    Get PDF
    We live in a bizarre world that is constantly changing. While thousands fall into a country demarcated below poverty lines, the world's top ten wealthiest men appeared to have more than doubled their fortunes during the epidemic. 'Davos Man: How the Billionaires Destroyed the World,' a book written by New York Times reporter Peter Goodman, explored how the ultra-rich are responsible for things like climate change, violence, and the collapse of democracy. Social workers seem to go along with fixing the society and reach the last impoverished man on the planet, unmindful of what appears to happen to resources.   The following is a report on the topics that were discussed at a meeting of social workers from around the world on 15 March 2022, which the Brisbane Institute of Strengths-Based Practice organised. Journal Space and Culture, India was also a part of this endeavour. There were nearly one hundred social workers attending the conference and a few thousand through other social media outlets

    Simulation of Rank Correlation Based Detection Mechanism for Distributed Denial of Services Attacks

    Get PDF
    Since the dawn of the Internet, DDoS exhibits a serious threat to the Internet, in which large number of controlled hosts floods the scapegoat or victim site with enormous packets. Furthermore, in Distributed Reflection DoS (DRDoS), invaders bluff or cheat innocent servers into flushing packets to the victim. However, most of current DRDoS detection mechanisms are associated with specific protocols and cannot be used for mysterious or unrecognized protocols. It is learnt that the stimulation by the same attacking flow, the responsive flows from reflectors may have inherent relations: the packet rate of one converged responsive flow may have linear relationships with another. Based on this investigation, the Rank Correlation based Detection (RCD) algorithm is proposed. The primary simulations denote that RCD can differentiate reflection flows from authorized and authenticated ones effectively and efficiently thus, can be utilized as a useable indicator for DRDoS. The paper presents a study of latest botnet attacks and proposes an appropriate guard method for DDoS attacks

    Synthesis of substituted isoxazoles and 1,3,4-oxadiazoles

    Get PDF
    697-69

    TPX: Biomedical literature search made easy

    Get PDF
    TPX is a web-based PubMed search enhancement tool that enables faster article searching using an alysis and exploration features . These features include identification of relevant biomedical concepts from search results with linkouts to source databases, concept based article categorization, concept assisted search and filtering, query refinement. A distinguishing feature here is the ability to add user-defined concept names and/or concept types for named entity recognition. The tool allows contextual exploration of knowledge sources by providing concept association maps derived from the MEDLINE repository. It also has a full-text search mode that can be configured on request to access local text repositories, incorporating entity co-occurrence search at sentence/paragraph levels. Local text files can also be analyzed on-the-fly

    Exploring the Anti-inflammatory and Anti-cancer compounds from the leaves of Acalypha indica

    Get PDF
    Abstract: Acalypha indica (Euphorbiaceae) is commonly known as Indian Copperleaf and India
    corecore