oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 43 )

2018 ( 286 )

2017 ( 308 )

2016 ( 393 )

Custom range...

Search Results: 1 - 10 of 139635 matches for " Narendra K.; Krishnan "
All listed articles are free for downloading (OA Articles)
Page 1 /139635
Display every page Item
Validation of spot-testing kits to determine iodine content in salt
Pandav,Chandrakant S.; Arora,Narendra K.; Krishnan,Anand; Sankar,Rajan; Pandav,Smita; Karmarkar,Madhu G.;
Bulletin of the World Health Organization , 2000, DOI: 10.1590/S0042-96862000000800007
Abstract: iodine deficiency disorders are a major public health problem, and salt iodization is the most widely practised intervention for their elimination. for the intervention to be successful and sustainable, it is vital to monitor the iodine content of salt regularly. iodometric titration, the traditional method for measuring iodine content, has problems related to accessibility and cost. the newer spot-testing kits are inexpensive, require minimal training, and provide immediate results. using data from surveys to assess the availability of iodized salt in two states in india, madhya pradesh and the national capital territory of delhi, we tested the suitability of such a kit in field situations. salt samples from delhi were collected from 30 schools, chosen using the expanded programme on immunization (epi) cluster sampling technique. a single observer made the measurement for iodine content using the kit. salt samples from madhya pradesh were from 30 rural and 30 urban clusters, identified by using census data and the epi cluster sampling technique. in each cluster, salt samples were collected from 10 randomly selected households and all retailers. the 15 investigators performing the survey estimated the iodine content of salt samples in the field using the kit. all the samples were brought to the central laboratory in delhi, where iodine content was estimated using iodometric titration as a reference method. the agreement between the kit and titration values decreased as the number of observers increased. although sensitivity was not much affected by the increase in the number of observers (93.3% for a single observer and 93.9% for multiple observers), specificity decreased sharply (90.4% for a single observer and 40.4% for multiple observers). due to the low specificity and resulting high numbers of false-positives for the kit when used by multiple observers (??real-life situations??), kits were likely to consistently overestimate the availability of iodized salt. th
Ribavirin-Induced Anemia in Hepatitis C Virus Patients Undergoing Combination Therapy
Sheeja M. Krishnan,Narendra M. Dixit
PLOS Computational Biology , 2011, DOI: 10.1371/journal.pcbi.1001072
Abstract: The current standard of care for hepatitis C virus (HCV) infection – combination therapy with pegylated interferon and ribavirin – elicits sustained responses in only ~50% of the patients treated. No alternatives exist for patients who do not respond to combination therapy. Addition of ribavirin substantially improves response rates to interferon and lowers relapse rates following the cessation of therapy, suggesting that increasing ribavirin exposure may further improve treatment response. A key limitation, however, is the toxic side-effect of ribavirin, hemolytic anemia, which often necessitates a reduction of ribavirin dosage and compromises treatment response. Maximizing treatment response thus requires striking a balance between the antiviral and hemolytic activities of ribavirin. Current models of viral kinetics describe the enhancement of treatment response due to ribavirin. Ribavirin-induced anemia, however, remains poorly understood and precludes rational optimization of combination therapy. Here, we develop a new mathematical model of the population dynamics of erythrocytes that quantitatively describes ribavirin-induced anemia in HCV patients. Based on the assumption that ribavirin accumulation decreases erythrocyte lifespan in a dose-dependent manner, model predictions capture several independent experimental observations of the accumulation of ribavirin in erythrocytes and the resulting decline of hemoglobin in HCV patients undergoing combination therapy, estimate the reduced erythrocyte lifespan during therapy, and describe inter-patient variations in the severity of ribavirin-induced anemia. Further, model predictions estimate the threshold ribavirin exposure beyond which anemia becomes intolerable and suggest guidelines for the usage of growth hormones, such as erythropoietin, that stimulate erythrocyte production and avert the reduction of ribavirin dosage, thereby improving treatment response. Our model thus facilitates, in conjunction with models of viral kinetics, the rational identification of treatment protocols that maximize treatment response while curtailing side effects.
Infantile acne
Krishnan K
Indian Journal of Dermatology, Venereology and Leprology , 2000,
Abstract: A rare case of a 15-month old girl who presented with true comedones, papules and occasional pustules over both cheeks of 6 months duration after the child was weaned off breast milk.
Guide-wire embolism during subclavian vein catheterization by Seldinger technique
Narendra H,Baghavan K
Indian Journal of Critical Care Medicine , 2006,
Abstract: Percutaneous cannulation of central veins by Seldinger technique is a popular approach in intensive care settings. We report a case of embolization of a complete guide-wire during such a procedure. Our case differs from the few earlier reported cases in that subclavian vein was the entry site. While reviewing the available literature, we discuss few reasons and management of such a mishap.
Design and Analysis of a Novel Digital Image Encryption Scheme
Narendra K Pareek
International Journal of Network Security & Its Applications , 2012,
Abstract: In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are takenfor scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Design and Analysis of a Novel Digital Image Encryption Scheme
Narendra K Pareek
Computer Science , 2012, DOI: 10.5121/ijnsa.2012.4207
Abstract: In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
D-Aminoacid Oxidase-Fe2O3 Nanoparticle Complex Mediated Antitumor Activity in Swiss Albino Mice  [PDF]
Saratchandran A. Divakaran, K. M. Sreekanth, K. V. Rao, Cherupally Krishnan Krishnan Nair
Journal of Cancer Therapy (JCT) , 2011, DOI: 10.4236/jct.2011.25089
Abstract: D-Aminoacid oxidase (DAO) was isolated from fresh porcine kidney; its cytotoxic potential was studied under in vitro and in vivo conditions. The isolated DAO was complexed with Fe2O3 nanoparticles and its potential as an oxidation therapeutic agent was analysed. The ability of the complex in eliciting H2O2 mediated cytotoxicity was studied on Dalton’s lymphoma ascites cells (DLA). The induction of apoptosis in DLA cells by Fe2O3-DAO complex was studied by morphological examination and alkaline single cell gel electrophoresis (comet assay). The antitumor activity of the complex was investigated by oral administration of the complex and the substrate D-alanine to tumor bearing Swiss albino mice and by targeting the complex to the tumor site, using an externally applied magnetic field. Fe2O3-DAO along with D-alanine showed remarkable cytotoxicity in a substrate concentration-dependent manner. Both morphological examination and comet assay revealed that Fe2O3-DAO/D-alanine induced apoptosis. Oral administration of Fe2O3-DAO and D-alanine along with magnetic targeting significantly suppressed tumor growth in mice. The present report provides the first evidence for the promising application of enzyme bound nanoparticles for targeted oxidation therapy.
MySQL based selection of appropriate indexing technique in hospital system using multiclass SVM
Narendra Kohli, Nishchal K Verma
International Journal of Engineering, Science and Technology , 2010,
Abstract: This paper deals with selection of appropriate indexing technique applied on MySQL Database for a health care system and related performance issues using multiclass support vector machine (SVM). The patient database is generally huge and contains lot of variations. For the quick search or fast retrieval of the desired information from the database, it becomes exigent to select and implement the appropriate indexing technique. Multiclass SVM is proposed to be the optimal solution as SVM could be trained with patient datasets to select the appropriate indexing method in the database of MySQL. B-Tree index is directly applied in most of the cases but other indexing techniques such as Bitmap and Hash are also used as per requirement. Using SVM, corresponding to the given search parameter for information, retrieval of information from the patient database results in quick retrieval of required information in the minimum processing time. Various SVM based methods like one against one, one against all, and fuzzy decision function are implemented for classification on standard electrocardiogram (ECG) datasets chosen from the University of California at Irvine (UCI) Cardiac Arrhythmias database. Suitable SVM method to be used is highlighted in the result section. Depending upon different feature values of ECG dataset, the SVM is trained to identify which categories or classes the given data points belong to. In the similar way appropriate indexing techniques will be selected in the case of health care system application by using multiclass SVM for fast retrieval of patient data. If the findings are made an integral part of the hospital system it could facilitate quick and easy retrieval of patient information, doctor information, hospital information etc. from any hospital as per the requirement. Health care system applications will be developed as front end in .Net whereas, back end as database in MySQL. International Journal of Engineering, Science and Technology, Vol. 2, No. 6, 2010, pp. 119-130
Mechanism of Trees / Bushes Like Pattern in Chemical System
P. K. Srivastava,Narendra Yadav
Journal of Chemistry , 2009, DOI: 10.1155/2009/579843
Abstract:
Interference Excision in Spread Spectrum Communications Using Adaptive Positive Time-Frequency Analysis
Krishnan Sridhar,Erkü?ük Serhat
EURASIP Journal on Wireless Communications and Networking , 2007,
Abstract: This paper introduces a novel algorithm to excise single and multicomponent chirp-like interferences in direct sequence spread spectrum (DSSS) communications. The excision algorithm consists of two stages: adaptive signal decomposition stage and directional element detection stage based on the Hough-Radon transform (HRT). Initially, the received spread spectrum signal is decomposed into its time-frequency (TF) functions using an adaptive signal decomposition algorithm, and the resulting TF functions are mapped onto the TF plane. We then use a line detection algorithm based on the HRT that operates on the image of the TF plane and detects energy varying directional elements that satisfy a parametric constraint. Interference is modeled by reconstructing the corresponding TF functions detected by the HRT, and subtracted from the received signal. The proposed technique has two main advantages: (i) it localizes the interferences on the TF plane with no cross-terms, thus facilitating simple filtering techniques based on thresholding of the TF functions, and is an efficient way to excise the interference; (ii) it can be used for the detection of any directional interferences that can be parameterized. Simulation results with synthetic models have shown successful performance with linear and quadratic chirp interferences for single and multicomponent interference cases. The proposed method excises the interference even under very low SNR conditions of dB, and the technique could be easily extended to any interferences that could be represented by a parametric equation in the TF plane.
Page 1 /139635
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.