4,940 research outputs found

    Evaluation of Waterhyacinth and Paddy Straw Waste for Culture of Oyster Mushrooms

    Get PDF
    Waterhyacinth ( Eichhornia crassipes (Mart.) Solms.) was evaluated at ratios of 25, 50 and 75% with paddy straw ( Oryza sativa L.) for oyster mushroom ( Pleurotus sajor-caju) cultivation. There was an increase in yield with decreasing ratio waterhyacinth

    Clinical and radiological recurrence after childhood arterial ischemic stroke

    Get PDF
    Background: Data on rates and risk factors for clinical and radiological recurrence of childhood arterial ischemic stroke (AIS) might inform secondary prevention strategies. Methods and Results: Consecutive Great Ormond Street Hospital patients with first AIS were identified retrospectively (1978–1990) and prospectively (1990–2000). Patients underwent repeat neuroimaging at the time of clinical recurrence or, if asymptomatic, at least 1 year after AIS. Cox and logistic regression analyses were used to explore the relationships between risk factors and clinical and radiological recurrence, respectively. A total of 212 patients were identified, of whom 97 had another prior diagnosis. Seventy-nine children had a clinical recurrence (29 strokes, 46 transient ischemic attacks [TIAs], 4 deaths with reinfarction 1 day to 11.5 years (median 267 days) later); after 5 years, 59% (95% confidence interval, 51% to 67%) were recurrence free. Moyamoya on angiography and low birth weight were independently associated with clinical recurrence in the whole group. Genetic thrombophilia was associated with clinical recurrence in previously healthy patients, independent of the presence of moyamoya. Sixty of 179 patients who had repeat neuroimaging had radiological reinfarction, which was clinically silent in 20. Previous TIA, bilateral infarction, prior diagnosis (specifically immunodeficiency), and leukocytosis were independently associated with reinfarction. Previous TIA and leukocytosis were also independently associated with clinically silent reinfarction. Conclusions: Clinical and radiological recurrence are common after childhood AIS. The risk of clinical recurrence is increased in children with moyamoya and, in previously healthy patients, in those with genetic thrombophilia. Preexisting pathology, including immunodeficiency, and persistent leukocytosis are risk factors for radiological recurrence, which suggests a potential role for chronic infection

    Female Language in Poet Uma Maheshwari’s Poems

    Get PDF
    In this article, we can learn about the female language style in the poems of poet Uma Maheshwari. The thought of style cannot go beyond grammar, and it is felt that knowledge of style is necessary to belied and absorb modern poetry. The poet, who was so high as to receive the Katha award for the poems written and preserved in the note, could identify the life forms and quest for knowledge he had encountered. His life and reading also understood how the content of poetry and techniques changed. The poet's poems show what is the need for the elements of the exposition to bring down his consciousness in the word poem, and how the reading of poetry unfolds by identifying them. The existence of the word in poetry and how poets exert creativity on that word can be understood. It is felt that in modern poetry too, tradition is interwoven, belie the claim that our traditional grammar has weakened since the development of linguistics. At the same time, it was possible to review the society in the word and the patriarchy hidden in it with modern thinking. Uma Maheshwari's poems also show how female consciousness can be constructed with female central words in such words

    Quantm Magnetoresistance of the PrFeAsO oxypnictides

    Full text link
    We report the observation of an unusual BB dependence of transverse magnetoresistance (MR) in the PrFeAsO, one of the parent compound of pnictide superconductors. Below the spin density wave transition, MR is large, positive and increases with decreasing temperature. At low temperatures, MR increases linearly with BB up to 14 T. For TT\geq40 K, MR vs BB curve develops a weak curvature in the low-field region which indicates a crossover from BB linear to B2B^2 dependence as BB\rightarrow0. The BB linear MR originates from the Dirac cone states and has been explained by the quantum mechanical model proposed by Abrikosov.Comment: accepted for publication in Appl. Phys. Let

    Development of Android Based Real Time Monitoring System for Fire-fighters

    Get PDF
    Fire-fighters are trained rescuers especially in extinguishing hazardous fires and saving lives from dangerous situations however they tend to put their lives at risk while on the job. Statistic shows the number of deaths of fire-fighters while on the job are still high up to this year and a higher percentage of rapid fire progress and exertion are dedicated to the cause of death of fire-fighters while on the job. Therefore, a real-time monitoring on the physiological state for fire-fighters is something crucial to be done. However, the Fire and Rescue Department of Malaysia practices the traditional communication method which is by communicating via walkie-talkie. The practice of real-time assessment should be carried out by Fire and Rescue Department of Malaysia in order to avoid having a fire-fighter’s live at risk. This could be achieved by using the ARMOR (Android Based Real Time Monitoring System) whereby it can transmit voice data and physiological data such as heart rate, respirator rate, peak acceleration and posture. Based on the research and critical analysis, an android platform have been found to be a suitable selection as it supports Bluetooth Wi-Fi and Radio Frequency, accessible from any android devices and it is user friendly. As a result, a real-time intelligent monitoring system was successfully developed on an android platform. The physiological data for heart rate, respiration rate, posture, and peak acceleration was successfully transmitted and monitored on an android device at real-time

    Predicting Malicious Node Behavior in Wireless Network Using DSR Protocol and Network Metrics

    Get PDF
    This paper describes a set of network metrics are helpful to predict behavior of malicious node in wireless network. The Network and internet is the device in which multiple people can communicate with each other through the wired or wireless media. Nowadays, Internet of Things, Mobile, vehicular, and wireless ad hoc networks all merge into one shared network. These networks are often used to send receive confidential data and information. The unauthorized or malicious node misuse these secrete information. With a rise in rogue nodes, network performance will suffer. A rogue node in the network can cause variations in network metrics including the packet dropping percentage, throughput, latency, energy consumption, and average queue duration. This behavior used to identify the malicious node

    Azhvarkal Kanda Manudam

    Get PDF
    World natural history is based on anthropology. Man grows little by little and becomes civilized and sets his course of life. He lives based on the elements of that life. He needs the truth of the best scholars to shine in that life. There are many ideas that Alvars have taken for human development to fulfill that need. The purpose of this study is to examine the pride and culture of non-caste life, instability of life, admiration, racial unity, hospitality, love, and chastity

    Performance of distributed mechanisms for flow admission in wireless adhoc networks

    Full text link
    Given a wireless network where some pairs of communication links interfere with each other, we study sufficient conditions for determining whether a given set of minimum bandwidth quality-of-service (QoS) requirements can be satisfied. We are especially interested in algorithms which have low communication overhead and low processing complexity. The interference in the network is modeled using a conflict graph whose vertices correspond to the communication links in the network. Two links are adjacent in this graph if and only if they interfere with each other due to being in the same vicinity and hence cannot be simultaneously active. The problem of scheduling the transmission of the various links is then essentially a fractional, weighted vertex coloring problem, for which upper bounds on the fractional chromatic number are sought using only localized information. We recall some distributed algorithms for this problem, and then assess their worst-case performance. Our results on this fundamental problem imply that for some well known classes of networks and interference models, the performance of these distributed algorithms is within a bounded factor away from that of an optimal, centralized algorithm. The performance bounds are simple expressions in terms of graph invariants. It is seen that the induced star number of a network plays an important role in the design and performance of such networks.Comment: 21 pages, submitted. Journal version of arXiv:0906.378
    corecore