oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 84 )

2018 ( 132 )

2017 ( 111 )

2016 ( 249 )

Custom range...

Search Results: 1 - 10 of 21482 matches for " Pavan Kumar Perugu "
All listed articles are free for downloading (OA Articles)
Page 1 /21482
Display every page Item
An uncommon variant of rare type of muscular dystrophy
Jayashankar C.A.,D. S. Somasekar,Adoor Gurucharan,Pavan Kumar Perugu
International Journal of Research in Medical Sciences , 2013, DOI: 10.5455/2320-6012.ijrms20130835
Abstract: The muscular dystrophies are a group of hereditary degenerative diseases characterised by progressive myopathy. Emery-Dreifuss muscular dystrophy (EDMD) is a rare genetically heterogenous type of muscular dystrophy characterized by early contractures (especially in the neck, elbows and ankles), slowly progressing muscle weakness more prominent in humeroperoneal region, onset in early childhood and cardiac problems. Emery-Dreifuss muscular dystrophy is commonly inherited in an X linked recessive pattern and rarely autosomal dominant inheritance or autosomal recessive fashion. Here we report a case of autosomal recessive type of Emery-Dreifuss muscular dystrophy from our hospital. [Int J Res Med Sci 2013; 1(3.000): 313-316]
Trucks at Roundabouts: A Synthesis Study  [PDF]
Pavan Kumar Chevuri
Journal of Transportation Technologies (JTTs) , 2018, DOI: 10.4236/jtts.2018.81004
Abstract: Roundabouts in United States and other countries have been proved to be very successful, effective, and a safe traffic control treatment. Roundabouts in the context of regularly expected truck configuration have also been successful for effective roundabout designs; however, there are always some site specific issues for trucks accommodation at roundabouts. Therefore, there is a great need for an informational guide in the form of synthesis report for roundabout designs specific to unique trucking traffic activity. While there are not significant literatures and studies in this subject, there are few studies/reports spread out which address various issues in this subject area. This study attempts to synthesize the research and knowledge of truck accommodation at roundabouts by synthesizing various research studies, reports, and articles; various subject areas such as roundabout designs for trucking activity, roundabout designs and accommodation strategies for specialized trucking activity such as oversized trucks, truck safety at roundabouts, and motor carrier perspective of trucking at roundabouts have been analyzed and relevant knowledge has been synthesized. This synthesis can be useful o researchers, designers, planners, and decision makers to determine effective ways to address specific trucking related issues at a roundabout.
Economic Evaluation of Conventional Radiography with Film and Computed Radiography: Applied at BMC  [PDF]
Usama Ali Rahoma, Pavan Kumar Chundi
Advances in Computed Tomography (ACT) , 2012, DOI: 10.4236/act.2012.13006
Abstract:

Conventional radiography with film (CRF) has been in use for diagnostic purposes for a long time now. It has proved to be a great assert for the radiographers in assessing various abnormalities. With recent advances in technology it is now possible to have digital solutions for radiography problems at a very cost effective, environment friendly and also with better image quality in certain applications when compared to CRF. Rather than using a CRF a computed radiography (CR) uses imaging plates to capture the image. The imaging plate contains photosensitive phosphors which contain the latent image. Later this plate is introduced into a reader which is then converted into a digital image. The major advantage and the cost effective element of this system is the ability to reuse the imaging plates unlike the photographic film where in only a single image can be captured and cannot be reused. The computed radiography drastically reduces the cost by eliminating the use of chemicals like film developers and fixers and also the need for a storage room. It also helps to reduce the costs that are involved in the disposal of wastes due to conventional radiography. This paper investigates whether it is cost effective to use computed radiography over film based system at Al-Batnan Medical Center (BMC), Tobruk, Libya by using Cost Benefit Analysis (CBA). Apart from the initial cost of the CR System, based on the data collected from the center, from the year 2008 to 2012 (until June 2012) a total of 581,566 images were produced with the total cost incurred using film based system being USD 4,652,528. If the same number of images were produced using a CR system the total cost incurred would have been USD 82,600. Taking into consideration the cost of a new CR system to be USD 120,000 the overall cost of producing these images is USD 202,600. It is observed that an amount of USD 4,449,928 could have been saved over the period of 5 years starting from 2008 to 2012 by using the CR system at BMC. Using Cost Benefit Analysis, the average value of the net difference between the costs and benefits for the conventional film based system is ?83.38 where as for the Computed System it is 22.06. Based on the principles of

Imagining the Terrorist: Racialization of Asian Identities since 9/11
Malreddy Pavan Kumar
Kasarinlan : Philippine Journal of Third World Studies , 2007,
Abstract: This paper argues that the emergence of the “new terrorism” discourse since 9/11 reconfigures the conventional categories of race and space by conflating “terrorism” with a host of Asian identities. Although the Middle East has become practically synonymous with “terrorism” since 9/11, the US-led global “war on terror” has strategically demarcated all the Islamic-led political dissents throughout Asia as potentially “terrorist” and volatile, thus depicting the region as a fearsome terrain, filled with dangerous and irrationally religious people who threaten civilization with deadly chaos. Indeed, it is only symbolic of the new racialization of Asia that recent studies on terrorism present an inordinate amount of “evidence” to draw linkages between the Islamist groups in Bangladesh, Sri Lanka, Pakistan, Indonesia, India, Malaysia, and Thailand, and the al-Qaeda terrorist network. While these are recent developments, the ideologies underpinning the new racialization of Asia have complex genealogies and discursive contexts. In an attempt to uncover these discursive contexts, this paper contends that the emergence of anthropology as a colonial science has been central to the indoctrination of the cultural-other, while geography has become an imperialist discourse in transforming the cultural-other into spatial categories. Although these discursive contexts continue to shape the otherization of Asian identity, they are being selectively deployed by the newfound discourses of “area studies,” “security studies,” and “terrorology” in the racialization of Asian identities since 9/11.
Diversity of fungi at various depths of marine water
Pavan Kumar Pindi
Research in Biotechnology , 2012,
Abstract: Fungi are native inhabitants of water and some species behave as opportunisticpathogens in man. Fungi, all above all filamentous fungi can occur almost everywhere, evenin marine water. The knowledge about the occurrence and diversity of fungi in water hasincreased considerably from a low knowledge base. The aim of this study was to gain anoverview of the spectrum of filamentous fungi in marine water. Stratified samples of marinewater were collected from Arabian Sea near Dona Paula beach, Goa under as sterile conditionsas possible from six different depths which varied from 5 to 200 centimeters in depth.Attempts were made to recover fungi from these different water samples collected. Fungiwere isolated by using membrane filtration and plating method with subsequent cultivationon agar plates. The different taxa of fungi were identified using routine techniques as well asmolecular methods. Fungi were analyzed in all the water samples examined. This paper aimsat the isolation and identification of fungi from marine water. The isolation of fungi fromdifferent depths of water suggests that there are a wide variety of fungi in marine water andthe most prevailing genera were found to be Aspergillus sp., Cladosporium cladosporioides andThysanophora sp. This study showed that marine water can also be a reservoir for widediversity of fungi.
A COMPARATIVE STUDY OF HELICOBACTER PYLORI, BIOPSY SAMPLES FROM DIFFERENT GASTRIC LESIONS WITH TRIPLE STAINING AND MODIFIED GIEMSA STAINING
Pavan Kumar Pindi
International Journal of Bioassays , 2013,
Abstract: Helicobacter pylori are associated with most of the disorders of gastro-duodenal tract, such as gastritis, gastric ulcers, dyspepsia and gastric carcinoma. Many staining methods have been developed for the detection of these bacteria from gastric biopsies. However most of the methods adopted were shown to be more expensive, less sensitive, time consuming with less background information. In view of this, the present study was carried out to check the validity of triple staining method against modified Giemsa staining. For this study, 60 biopsy specimens were selected from different gastric lesions as chronic gastritis (30), gastric ulcers (10) and gastric carcinoma (20). These specimens were subjected to modified Giemsa staining showed purple to dark purple bacteria with bluish background. The results showed 56.66, 40 and 15 percentage positivity for chronic gastritis, benign gastric ulcers and malignant gastric lesions, respectively. The stained sections of triple staining showed black to dark brown bacteria with pink colored background with 70, 50 and 10 percentage positivity for chronic gastritis, benign gastric ulcers and malignant gastric lesions, respectively. From the present study it is clear that triple staining method is more sensitive than the modified Giemsa staining.
ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS
Vooka Pavan Kumar
Journal of Global Research in Computer Science , 2011,
Abstract: The term ‘peer-to-peer’ generally describes a class of systems that employ distributed resources to perform a specific function in a decentralized manner. Distributed P2P networks are widely used for file sharing and in such a scenario, a Distributed P2P network could be easily exploited by an attacker to establish a DDoS attack against any arbitrary host on the internet. Distributed denials of service (DDoS) attacks are very hard to detect and regarded as a major threat to the Internet. Though a number of techniques have been proposed to defeat DDoS attacks in Distributed P2P networks, it is still very hard to respond to flooding- based DDoS attacks due to a large number of attacking machines and the use of source- address spoofing. An efficient framework has been designed to detect and defend against DDoS attacks in Distributed Peer-to-Peer networks. It defends against attacks by considering the distance between the source ends and the victim end and also the Time-to-Live (TTL) value in IP header. The proposed system has three major components: DDoS detection, agent-based trace back, and traffic control. The agent based mechanism is used to keep track of all the node details (e.g. bandwidth, node capacity, etc). The proposed system can be evaluated on a network simulation platform called NS2. The results demonstrate that the detection techniques are capable of detecting DDoS attacks accurately, and the defence mechanism can efficiently control attack traffic in order to maintain the quality of service for legitimate traffic. Also, the framework shows better performance in defeating the DDoS attacks in Distributed P2P networks compared to the other existing techniques. Keywords: Distributed Peer-to-Peer Networks, Distributed Denial of Service Attack, Time-to-Live, Internet Protocol
ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS
Vooka Pavan Kumar
Journal of Global Research in Computer Science , 2011,
Abstract: The term ‘peer-to-peer’ generally describes a class of systems that employ distributed resources to perform a specific function in a decentralized manner. Distributed P2P networks are widely used for file sharing and in such a scenario, a Distributed P2P network could be easily exploited by an attacker to establish a DDoS attack against any arbitrary host on the internet. Distributed denials of service (DDoS) attacks are very hard to detect and regarded as a major threat to the Internet. Though a number of techniques have been proposed to defeat DDoS attacks in Distributed P2P networks, it is still very hard to respond to flooding- based DDoS attacks due to a large number of attacking machines and the use of source- address spoofing. An efficient framework has been designed to detect and defend against DDoS attacks in Distributed Peer-to-Peer networks. It defends against attacks by considering the distance between the source ends and the victim end and also the Time-to-Live (TTL) value in IP header. The proposed system has three major components: DDoS detection, agent-based trace back, and traffic control. The agent based mechanism is used to keep track of all the node details (e.g. bandwidth, node capacity, etc). The proposed system can be evaluated on a network simulation platform called NS2. The results demonstrate that the detection techniques are capable of detecting DDoS attacks accurately, and the defence mechanism can efficiently control attack traffic in order to maintain the quality of service for legitimate traffic. Also, the framework shows better performance in defeating the DDoS attacks in Distributed P2P networks compared to the other existing techniques. Keywords- Distributed Peer-to-Peer Networks, Distributed Denial of Service Attack, Time-to-Live, Internet Protocol
Feature Normalisation for Robust Speech Recognition
D. S. Pavan Kumar
Computer Science , 2015,
Abstract: Speech recognition system performance degrades in noisy environments. If the acoustic models are built using features of clean utterances, the features of a noisy test utterance would be acoustically mismatched with the trained model. This gives poor likelihoods and poor recognition accuracy. Model adaptation and feature normalisation are two broad areas that address this problem. While the former often gives better performance, the latter involves estimation of lesser number of parameters, making the system feasible for practical implementations. This research focuses on the efficacies of various subspace, statistical and stereo based feature normalisation techniques. A subspace projection based method has been investigated as a standalone and adjunct technique involving reconstruction of noisy speech features from a precomputed set of clean speech building-blocks. The building blocks are learned using non-negative matrix factorisation (NMF) on log-Mel filter bank coefficients, which form a basis for the clean speech subspace. The work provides a detailed study on how the method can be incorporated into the extraction process of Mel-frequency cepstral coefficients. Experimental results show that the new features are robust to noise, and achieve better results when combined with the existing techniques. The work also proposes a modification to the training process of SPLICE algorithm for noise robust speech recognition. It is based on feature correlations, and enables this stereo-based algorithm to improve the performance in all noise conditions, especially in unseen cases. Further, the modified framework is extended to work for non-stereo datasets where clean and noisy training utterances, but not stereo counterparts, are required. An MLLR-based computationally efficient run-time noise adaptation method in SPLICE framework has been proposed.
“We Have Already Happened.”
Malreddy Pavan Kumar and Niven Kumar.
Nebula , 2010,
Abstract:
Page 1 /21482
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.