oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 4 )

2018 ( 6 )

2017 ( 25 )

2016 ( 50 )

Custom range...

Search Results: 1 - 10 of 7520 matches for " Dr. Shubhangi Prashant Nigwekar "
All listed articles are free for downloading (OA Articles)
Page 1 /7520
Display every page Item
Calcifying Tumor of Malherbe
Dr.Bharti Padmakar Baviskar,Dr. Ravindra Karle,Dr. Shubhangi Prashant Nigwekar,DR. SOMEN MISRA
International Journal of Biomedical and Advance Research , 2013, DOI: 10.7439/ijbar.v4i3.321
Abstract: ABSTRACT Tumours of the eyelid are not very common. Frequently we come across squamous cell carcinoma. We are reporting a rare case of calcifying epithelioma of eye. The usual presenting region is the hair bearing areas of body and upper extremity. A 15 years old male presented with swelling over upper lid. Clinically diagnosed as molluscum contagiosum. Surgical excision was carried out. Histopathology confirmed it as calcifying epithelioma of the eye. Epithelioma situated over the eyelid is very rare.
OPHTHALMOMYIASIS EXTERNA : A CASE REPORT
Shubhangi Nigwekar
Pravara Medical Review , 2009,
Abstract: Ophthalmomyiasis, fly larvae infestation of eye, is a rare condition that can have variable presentation depending on the type of fly, the ocular structures involved, and the level of penetration. A case of ophthalmomyiasis externa presented with foreign body sensation, itching and redness of eyes for 4 days is documented. Mechanical removal and good local treatment helped the patient .The larva isolated was that of Oestrus ovis (sheep nasal botfly). Ophthalmomyiasis externa is mainly caused by sheep botflyOestrus ovis and it is more common in farming communities.Our patient was also a 35 years old male farmer and had history of contact with farm animals. This infestation is rare in India as very few casesare on records.
Ocular Molluscum contagiosum- A Case Report
Nigwekar Shubhangi
Pravara Medical Review , 2009,
Abstract: Molluscum contagiosum is an infection of skin caused by Poxvirus and usually affects eyelid margins as pearly pink umbilicated tumor. Single molluscum contagiosum lesion is more common in school goingchildren who are otherwise healthy while multiple lesions are seen in immunosupressed patients. Eighteen months healthy female child, a case of molluscum contagiosum, presented with multiple swellings onright upper and lower eyelid margins with mild conjunctival congestion of 6 months duration. The case was investigated and treated with surgical excision followed by postoperative local antibiotic treatment which helped the patient. Histopathological report of excised tissue confirmed the diagnosis of molluscumcontagiosum. The patient had an uneventful recovery.
SYNTHESIS OF TRISUBSTITUTED PURINE COUPLED WITH CARBOXAMIDE DERIVATIVES OF AMINO ACIDS Synthese trisubstituierter PURINE MIT CARBOXAMIDE COUPLED Derivate von Aminos uren.
Sachin Pande, Prashant Utale, Suresh Gholse, Pradip Tekade, Shubhangi Patil
Heterocyclic Letters , 2013,
Abstract: A series of some trisubstituted purine coupled with carboxamide derivative of amino acids at the C2 position were synthesized. The targeted compounds were synthesized from coupling of 9- methyl-6-(piperidin-1-yl)-9H-purin-2-amine with carboxamide derivatives of amino acids. The newly synthesized compounds were characterized using IR, Mass, 1H-NMR, and 13C-NMR analysis.
Analyzing Relation in Application Semantics and Extended Capabilities for Secret Sharing Schemes
Sonali Patil,Dr. Prashant Deshmukh
International Journal of Computer Science Issues , 2012,
Abstract: Secret Sharing Schemes (SSS) refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number of shares are combined together; individual shares are of no use on their own. Secret sharing has been an active research field for many years by mathematicians as object of intrinsic interest in their own right, cryptographers as important cryptographic primitives and security engineers as technique to employ in distributed security applications. In many circumstances, secret sharing has to provide more flexibility and functionality as per the need of an application. The intent of this paper is analyzing relation in application semantics and extended capabilities such as general access structure, verifiability of shares, cheater identification, enroll and dis-enroll of shareholders, recover lost or corrupted shares and periodically renew shares.
Outlier Detection Techniques over Streaming Data in Data Mining: A Research Perspective
Prakash Chandore,,Dr. Prashant Chatur
International Journal of Recent Technology and Engineering , 2013,
Abstract: Data mining is extensively studied field of research area; where most of the work is emphasized over knowledge discovery. Data stream mining is active research area of data mining. A data stream is a massive sequence of data elements continuously generated at a rapid rate. In streaming huge amount of data continuously inserted and queried such data has very large database. Streaming data analysis has recently attracted attention over data stream rather than mining large data sets in data mining community. Outlier Detection as branch of data mining has many applications in data stream analysis and requires more attention. Finding and removing outlier over data stream is very important aspect in data mining. Detecting outlier and analyzing data stream for large dataset we can consider two main groups where one group refers to data stream and data mining techniques and second group refers to different efficient algorithm to mine data stream. Detecting outliers and analyzing large data sets can lead to discovery of unexpected knowledge in area such as fraud detection, telecommunication, web logs, and web document and click stream, etc. In this paper we try to clarify problem with detecting outlier over Dynamic data stream and specific techniques used for detecting outlier over streaming data in data mining.
Symmetrical Peripheral Gangrene: Multifactorial Association. A Case Report
Dr. Prashant Kumar,Dr. K. K. Girdhar,Dr. Raktima Anand
Indian Anaesthetists' Forum , 2006,
Abstract: We describe a case of a young woman, operated for perforation peritonitis who was admitted postoperatively in ICU for deranged consciousness level, hypotension and inadequate respiration. She developed symmetrical peripheral gangrene (SPG) supposedly due to multifactorial association of shock, septicemia, DIC and Dopamine.
A Review of Routing Protocols for MANET
Prashant Kumar Shukla,Dr. R. Singhai
International Journal of Engineering Innovations and Research , 2012,
Abstract: A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. Data transmission between two nodes in MANET’s may be requires multiple hops as the nodes transmission range is limited. Mobility of the different nodes makes the situation even more complicated. Multiple routing protocols especially for these conditions have been developed during the last few years, to find optimized routes from a source to some destination. Ad-hoc network suffer from the lot of issues i.e. congestion, Throughput, delay, security, network overhead. Packet delivery ratio is the issues of ongoing research. This survey gives a comprehensive overview of AODV (Ad-hoc on demand Distance Vector Routing) detailed comparison of different research on AODV has been presented. Open research direction is also discussed to serve as a starting point to future protocol design and evaluation.
An Efficient Technique of Image Clustering using Limited Devices
Monika Bhatnagar,Dr. Prashant Kumar Singh
International Journal of Electronics Communication and Computer Technology , 2012,
Abstract: Data mining technique provides several facilities to facilitate several tasks related with large amount of data. Among these tasks the very common ones are association rule mining, classification and clustering. Clustering is gaining its popularity as efficient classifier. Clustering can be easily used as a classifier on limited devices because it uses less amount of space which is an important factor for limited devices. In this paper we present how clustering can be used as an image classifier in limited devices.
CHOICE OF EFFICIENT IMAGE CLASSIFICATION TECHNIQUE USING LIMITED DEVICE
Monika Bhatnagar,Dr. Prashant Kumar Singh
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: Image classification can now be seen as emerging field as its usage is becoming essential in areas such as medical, geographical, satellite etc. Image classification on limited devices such as cellular phone is also coming in demand as the technology is advancing because now people want solutions to their problems available all the time in their hands. Here we are considering the special case of Indian farmers. Now with the several datamining techniques that are available to be used to construct the classifier for images, the choice of classification becomes a trivial task. This paper shows what classification technique can be used to build classifier amongst the available ones.
Page 1 /7520
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.