Primary pyomyositis is infection of the skeletal muscles in the absence of adjacent skin, soft ti... more Primary pyomyositis is infection of the skeletal muscles in the absence of adjacent skin, soft tissue, and bone infection. This study was undertaken to look at the spectrum of clinical presentations, therapeutic interventions, and their outcomes and also to evaluate the association of various risk factors with mortality. This was a retrospective study in which the patients admitted with the diagnosis of primary pyomyositis from January 2000 to June 2007 were included. Their demographic details, clinical and laboratory data, Sequential Organ Failure Assessment (SOFA) score at presentation, treatment instituted, complications encountered, and hospital outcome were recorded. Sixty-seven patients (42 males and 25 females) with a diagnosis of primary pyomyositis were included. Median age at the time of presentation was 37 years (interquartile range=25-50 years). Common presenting symptoms were myalgias [50 (74.62%)] and fever [49 (73.13%)]. Twenty-six patients had underlying predisposing medical conditions. The commonest muscle group involved was iliopsoas muscles in 31 (46.26%) patients. Methicillin-sensitive Staphylococcus aureus was the commonest organism isolated from the pus. Twentyeight patients developed sepsis and seven died. On univariate analysis, there was a statistically significant association between higher SOFA score, lower Glasgow coma scale, higher pulse rate, lower blood pressure, raised blood urea, raised serum creatinine, higher serum glutamic pyruvate transaminase, raised total bilirubin at presentation, and development of sepsis during hospital stay with mortality. In our study, the patients were seen almost a decade later than those seen in other studies from the region. Evidence of organ dysfunction at presentation and sepsis was associated with increased mortality.
Privacy Preserving Anonymization Schemes-On Transaction Data Publishing
Journal of Computational and Theoretical Nanoscience, 2020
Now days, due to the sheer amount of data, its complexity and the rate at which it is generated, ... more Now days, due to the sheer amount of data, its complexity and the rate at which it is generated, traditional algorithms that are present so far for the privacy preservation of relation data publishing are not capable enough to ensure privacy as efficiently for transactional data also. From last two decades the interest also increases to provide better data preserving schemes for data publishing. There are a number of algorithms, schemes, models and techniques in the literature that ensure privacy against identity disclosure and attribute disclosure attacks. This paper is a comprehensive survey of the past work done in the field of anonymization to provide privacy against transactional data publishing.
International Journal of Innovative Technology and Exploring Engineering, 2019
The communication becomes more critical when the network is having high speed mobility and restri... more The communication becomes more critical when the network is having high speed mobility and restricted coverage. WPAN is one such network defined for indoor network and with smaller sensing limit. In this work, a quantum inspired encoded communication is provided to improve the communication reliability and security. The work model is defined for a randomly distributed and high mobility based WPAN network. At first phase of this model, the node level characterization is applied under coverage, stability and load parameters. Later on genetic model is applied to identify the most effective communication pair. Finally, the quantum key based SHA is applied to perform the data encoded. This encoded communication is performed over the network. The comparative results shows that the work model has reduced the communication loss over the network
Cardiac disease is the main outstanding reason for death over the humankind. The main reason of c... more Cardiac disease is the main outstanding reason for death over the humankind. The main reason of cardiac attack is lead to be the blockage of blood vessels, chest pain or stroke, it is mainly caused the blood clotting in arteries, due to this some patients have unstable angina. This disease could be a diagnosis by the prediction and detection of patient history records the current Status of Patients. It is mainly due to when the heart is not properly working and unable to supply the amount of blood in the blood vessels. It is the most essential organ of the individual body. Heart disease (HD) detection could be calculated by different datasets that are relating to medical parameters that provide to the cardiology related information. The big challenge is the shortage of physicians, experts that may arise the death, and patient disability. For analysis it needs an expert system that discovers their related hidden patterns for the heart disease envision using medical data. One of the most cognitive procedures that are data mining which is used the patterns of huge datasets by the hidden approach. This paper presents the survey and comparative analysis on Heart Disease prediction using various ML approach. This study helps us to know the existing technologies to cure Heart Disease as well as the best technology in terms of accuracy rate. In this paper with the help of different Machine learning Algorithms different works is compared.
International Journal on Recent and Innovation Trends in Computing and Communication
Heart diseases that occur due to the blockage of coronary arteries, which causes heart attack, ar... more Heart diseases that occur due to the blockage of coronary arteries, which causes heart attack, are also commonly known as myocardial infarction. Rapid detection and acute diagnosis of myocardial infarction avoid death. The electrocardiographic test or ECG signals are used to diagnosis myocardial infarction with the help of ST variations in the heart rhythm. ECG helps to detect whether the patient is normal and suffering from myocardial infarction. In blood, when the enzyme value increases, after a certain time pass occurs, heart attack. For ECG images, the manual reviewing process is a very difficult task. Due to advancements in technology, computer-aided tools and software are used to diagnosis myocardial infarction,because manual ECG requires more expertise .so that automatic detection of myocardial infarction on ECG could be done by different machine learning tools. This study detects the normal and myocardial infarction patients by selecting the feature with their feature weight...
Available online at: www.ijarcsse.com Sophisticated Image Encryption Using OpenCV Ashish Pant
— With the advancement of Internet the image transferred within the network should be encrypted s... more — With the advancement of Internet the image transferred within the network should be encrypted so that the hackers can not extract the useful information from the image. By using open source computer vision library (OpenCV for short), the data structure of IPL Image (IPL is the main data type of OpenCV which represents image) and its member variable are analyzed and the basic library functions for image handling and processing are used. Library functions are used for loading image, creating a window, saving image, creating an image and to access pixels of image in spatial domain. Arnold transformation also called cat-face transformation is used for first transforming the coordinates of the pixels which is called location scrambling. After that multi dimensional Arnold transformation is used for color scrambling i.e. changing the pixel values for the Red, Green and Blue channels of the image, hence encrypting the image. Inverse Arnold transformation is used for decrypting the image ...
With the advancement of Internet the image transferred within the network should be encrypted so ... more With the advancement of Internet the image transferred within the network should be encrypted so that the hackers can not extract the useful information from the image. By using open source computer vision library (OpenCV for short), the data structure of IPL Image (IPL is the main data type of OpenCV which represents image) and its member variable are analyzed and the basic library functions for image handling and processing are used. Library functions are used for loading image, creating a window, saving image, creating an image and to access pixels of image in spatial domain. Arnold transformation also called cat-face transformation is used for first transforming the coordinates of the pixels which is called location scrambling. After that multi dimensional Arnold transformation is used for color scrambling i.e. changing the pixel values for the Red, Green and Blue channels of the image, hence encrypting the image. Inverse Arnold transformation is used for decrypting the image an...
The increasing popularity of E-Learning has invented new terms to education, as Virtual Classroom... more The increasing popularity of E-Learning has invented new terms to education, as Virtual Classroom Learning, where students can interact with the professors from their home. Virtual learning is an effective alternative to traditional classroom learning. Virtual learning provides the methodologies and solutions such as distance learning and hybrid classes. It will have a significant impact on the educational environment in the upcoming days. One way to implement virtual classroom is using cloud computing. Cloud computing is an emerging new computing paradigm for delivering computing services. This computing approach relies on a number of existing technologies, e.g., the Internet, virtualization, grid computing, Web services, etc. Cloud computing is a construct that allows us to access applications that actually reside at a location other than our computer and it is highly scalable and use virtualized resources that can be shared by all the users. In this paper it is argued that cloud ...
To solve the path schematization in the complicated environments, a new adaptive schematization m... more To solve the path schematization in the complicated environments, a new adaptive schematization methodology using ant colony algorithm (AACA) based on prognosticative learning is presented. A novel prognosticative operator for direction during the ant colony state transition is constructed based on an obstacle restriction method (ORM), and the prognosticative results of proposed operator are taken as the prior knowledge for the learning of the initial ant pheromone, which improves the optimization efficiency of ant colony algorithm (ACA). To further solve the stagnation problem and improve the searching ability of ACA, the ant colony pheromone is adaptively adjusted under the limitation of pheromone. Compared with the corresponding ant colony algorithms, the simulation results indicate that the proposed algorithm is characterized by the good convergence performance on pheromone during the path schematization. Furthermore, the length of planned path by AACA is shorter and the converg...
International Journal of Innovative Technology and Exploring Engineering
Due to rapid development of internet and web applications, the prominence and the importance of t... more Due to rapid development of internet and web applications, the prominence and the importance of the information exchange using the internet is growing. Communication through internet faces data safety as an important issue. Data has to be safe when communicating as slightly loss or danger to transmitted data can be responsible for excessive harm to the society. For network safety encryption plays a vibrant part. Many times it is little bit confusing to choose best encryption, as there are many cryptography methods for securing the data during transmission. For many applications Blowfish is currently assumed to be insecure. So it turns out to be essential to enhance this procedure through addition of different levels of safety so that it can be used in several reliable communication channels. Blowfish algorithm is modified in a way that it is platform independent; however the present encryption schemes are restricted to platform dependent proposal. This proposed modified blowfish alg...
Nowadays the entire globe is connected with enormous devices which communicates in high performan... more Nowadays the entire globe is connected with enormous devices which communicates in high performance environment and generates huge big data. With the adoption of social media and real time broadcasting channels, the big data gets logged is required to be evaluated effectively so that the security and integrity can be maintained. These big data based integrations are implemented using advanced network environment and obviously needs higher degree of security and integrity. In current scenarios, most of the people are now using smart gadgets to access the corporate, social and government services. The smart gadgets are having high performance operating systems including Android, iOS, Windows, Blackberry, Tizen, Lune OS, Kai OS and many others. With the increase of such platforms, the need of security and integrity arise and because of this the scheduling and security based environment are projected. In this research manuscript, the security and scheduling based approach is presented a...
Uploads
Papers by Suneet Kumar